Issues [Year wise]

Year Wise :


Paper Title : A Survey: Query Processing Techniques for Secure Cloud Databases
Authors : N.Swetha,, Prof. S Ramachandram, , ,
Affiliations : Research Scholar, Dept. of CSE, Osmania University, Hyderabad
Principal, Dept. of CSE, Osmania University, Hyderabad.
Abstract :
The Major challenge in cloud computing is to manage distributed cloud. Traditional relational database management systems (RDBMS) are a choice but they are not compatible to measure crossways large clusters of distributed servers. Therefore changeovers to RDBMS have been developed. The development of new database management systems (DBMS) for the cloud computing environment or flexibility of the existing systems to the cloud computing environment is a critical component of cloud computing research. This paper focuses on the study of a relational database system based on holomorphic encryption schemes to preserve the integrity and confidentiality of the data. And also examines various SQL queries over encrypted data. And this paper helps in focusing where research is needed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhancing CAPTCHA based Image Authentication for E-mail ID and Password
Authors : MACHARLA BHANU KUMAR, K.KRANTHI KUMAR, , ,
Affiliations : Pursuing M.Tech, CSE Branch,Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
NRI Institute of Technology, Guntur, Andhra Pradesh, India
Abstract :
-In this paper we survey the current Captcha password schemes furthermore exhibit the significance of Email authentication over cutting edge Captcha Advancements where Captcha and Its graphical password it can addresses various security issues out and out. CAPTCHA is accomplished by revision of letters in order arbitrarily on the catches and it is anything but difficult to baffle by straightforward key loggers .In data security, client authentication is a noteworthy issue in each framework. What's more, for authentication reason each framework relies on upon password whether it is literary password or graphical password. CAPTCHA is a test work by computer programs which human can pass however computer programs can't pass .The thought process of incorporating so as to enhance Email authentication is finished visual authentication instruments. This is ensured to the regular assaults endured by other authentication schemes.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Performance of AHB Bus Tracer with Dynamic Multiresolution and Lossless Real Time Compression
Authors : VELLANKI SATHEESH BABU, B.N. SRINIVASA RAO, , ,
Affiliations : Pursuing M.Tech, VLSI DESIGN, Dept of ECE
Assistant Professor, Department of Electronics and Communication Engineering Avanthi Institute of Engineering and Technology, Visakhapatnam, Andhra Pradesh, India.
Abstract :
In this paper we demonstrate the On-Chip bus SoC(system-on-chip) infrastructure that connects major hardware components. Monitoring the on-chip bus signals is crucial to the SoC debugging and performance analysis/optimization. The past two decades of SoC evolution have seen an exponential increase in complexity. Today’s devices have multiple processing units, CPUs, GPUs, DSPs, DMAs, third-party IP blocks and custom logic. As if the hardware is not complicated enough, there will of course be substantial amounts of sophisticated software code running on the SoC hardware/software integration, and testing are made very much harder. The commercial consequences of problems in the development flow are potentially dire: since the debugging / analysis needs are adaptable: some designers need all signals at cycle-level, while some others only care about the transactions. For the latter case, tracing all signals at cycle-level wastes a lot of trace memory. Thus, there must be a way to capture traces at different abstraction levels based on the specific debugging/analysis need.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : An Effective Supermodularity Based Approach for Data Privacy at Storage Level
Authors : Annamneni Soujanya, Baburao Kopuri, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Associate Professor, Department of Computer Science & Engineering, NRI Institute of Technology.
Abstract :
In this paper we presented a supermodulaity based approach for data privacy using noval encryption mechanisum in this conncetion the seviority of data privacy at storage level is most considerable so in our presented system lack of data privacy , scalability due to low security algorithm while data transformation so in our proposed system Scalability and privacy risk of data anonymization can be addressed by using differential privacy. Differential privacy provides a theoretical formulation for privacy. A scalable algorithm is use to find the differential privacy when applying specific random sampling. The risk function can be employ through the supermodularity properties.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : SYSTEM EVALUATION OF 32 BIT UNNSIGNED MULTIPLER USING CLAA AND CSLA.
Authors : SIVASANKAR RAO.Y, SOMASEKHAR .A, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
- In this paper deals with the comparison of the VLSI design of the carry look-ahead adder (CLAA) based 32- bit signed and unsigned integer multiplier. Multiplication is a fundamental operation in most signal processing algorithms. Multipliers have large area, long latency and consume considerable power. Therefore low-power multiplier design has been an important part in low- power VLSI system design. In computational circuits the adders plays a key role in arithmetic operations. Adders like Ripple carry adder, Carry look ahead adder, Carry select adder, Carry skip adder and carry save adder etc. In this paper, a high performance and low power 32bit unsigned multiplier is proposed using adders. The CLAA based multiplier and CSLA based multiplier uses the same delay for multiplication operation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Square and Cube Architecture using Less Complex and Low Power Architectures
Authors : BELLAM SREEKANYA, K.RAKESH, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
In this paper we are going to explore the importance of the design of a Low power and less area square and cube architectures using Vedic sutra , the optimized multiplier are having regular, less complex and parallel structure in design thus this kind of algorithm and its designs used to design square and cube circuit using Vedic sutras over and over again times square and cube are the most sustained on operations in several digital signal processing applications and computation can be condensed using Radix8 and the overall processor performance can be improved for numerous applications.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Investigation on Performance of high speed CMOS Full adder Circuits
Authors : KATTUPALLI KALYANI, G.VASANTH RAO, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
- In this paper we demonstrate the performance analysis of CMOS Full adder circuits in this connection the full Adder is designed using CMOS logic style by dividing it in three modules so that it can be optimized at various levels. First module is an XOR-XNOR circuit, which generates full swing XOR and XNOR outputs simultaneously and have a good driving capability. The objective this concept is identified the comparison of power, surface area and complexity of Full adder designs using CMOS Logic Styles. Full adder Design is better compared to conventional design. Transistor Design with respect to power, delay, Power Delay Product Comparison. It is observed that less power is consumed in the Transmission based full adder than the Convention full adder and Pass Transistor full adder.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : IMPLEMENTATION OF HARDWARE IP ROUTER BASED ON VLSI
Authors : KARLAPUDI SRAVANI, P T BALAKRISHNA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
A Network-on-chip is a new paradigm in complex system-on-chip designs that provide efficient on chip communication networks. It allows scalable communication and allows decoupling of communication and computation. The data is routed through the networks in terms of packets. We attempts to overcome latency and time reduction issue and can provide multipurpose networking router by means of verilog and it was synthesized in Xilinx 13.2 version, simulated Modelsim 10.0 version. In this paper our attempt is to provide a multipurpose networking router by means of Verilog code, by this we can maintain the same switching speed with more secured way of approach we have even the packet storage buffer on chip being generated by code in our design in the so we call this as the self-independent router called as the VLSI Based router. The three architectures were analyzed for their performance in terms of delay, throughput and latency and we concluded that CDMA router performs better than the other two.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Circuit for Revisable Quantum Multiplier Implementation of Adders with Reversible Logic
Authors : KONDADASULA VEDA NAGA SAI SRI, M.SAI RAMA KRISHNA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science For Women
Abstract :
Programmable reversible logic is gain wide consideration as a logic design style for modern nanotechnology and quantum computing with minimal impact on circuit heat generation in improved computer architecture and arithmetic logic unit designs. In this paper, a 2*2 Swap gate which is a reduced implementation in terms of quantum cost and delay to the previous Swap gate is presented. Then, a novel 3*3 programmable UPG gate capable of calculating the universal logic calculations is presented and verified, and its advantages over the Toffoli and Peres gates are discussed. The UPG is then implemented in a reduced design for calculating n-bit AND, n-bit OR and n-bit ZERO calculations. Then, two 3*3 RMUX gates capable of multiplexing two input values with reduced quantum cost and delay compared to the previously existing Fredkin gate is presented and verified. Next, a novel 4*4 reversible programmable RC gate capable of nine unique logical calculations at low cost and delay is presented and verified. The UPG and RC are implemented in the design of novel sequential and tree-based comparators. These designs are compared to previously existing designs, and their advantages in terms of cost and delay are analyzed.Then, the RMUX is used to improve a reversible SRAM cell we previously presented. The memory cell and comparator are implemented in the design of a Min/Max Comparator device.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enable Batch Auditing for Secure Cloud Storage Using TPA
Authors : PRATHIBHA MAGULURI, B.RANJITHKUMAR, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science for women’s
Associate Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science for women’s
Abstract :
In this paper we used cloud storage servers remotely in order to store and share the data and enjoy the ondemand high-quality applications and services from a shared pool of configurable computing resources, without communication challenges However, the fact that users no longer have physical control over outsourcing data in this connection data integrity over public cloud is a challenging task, thus this integrity will audited by trusted third party behalf of cloud without reviling any user privacy and also TPA executes multiple task simultaneously i.e batch auditing our proposed framework provides high security and high performance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Recommender Systems for e-commerce application using CF
Authors : SIVA KALYANI, S NAGA LAKSHMI, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Assistant Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
Collaborative filtering (CF) is a very important and common technology for recommender systems. Recommender systems are evidenced to be valuable means that for internet on-line users to deal with the data overload and became one amongst the foremost powerful and common tools in e-commerce. However, current CF ways suffer from such issues as knowledge sparseness, recommendation quality and big-error in predictions with lack of user privacy. There are 3 common approaches to determination the suggestion problem: ancient cooperative filtering, cluster models, and search-based ways and a completely unique rule to advocate things to users supported a hybrid technique. Initial we have a tendency to use cluster to create the user clusters supported the similarity of users. We’ve got taken users look history for similarity calculation. Second we have a tendency to be getting to realize the things that are powerfully related to one another by victimization association rule mining. Finally we'll be victimization these robust association rules in recommendation of things. In ordered to supply the protection we have a tendency to used onion routing algorithms.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving of Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Authors : K Naga Brahma Chari, Dr G Rama swamy, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
Disruption-tolerant network advancements are becoming to be a productive provision that enable remote device passed on by officers to articulate with one another and access the classified information or secret information by abusing outside storage nodes. This framework provides the effective state of associations to approval methods and therefore the solutions overhaul for secure information recovery in most troublesome cases. The foremost encouraging scientific discipline solutions are at home with management the access problems known as Cipher text-Policy AttributeBased encoding (CP-ABE). Indisputably the foremost troublesome problems during this state are the requirement of endorsement arrangements and therefore the methodologies design for secure information recovery. Then again, the problem of applying CP-ABE in suburbanized DTNs presents a handful of securities and insurance challenges on the property denial, key escrow, and coordination of characteristics issued from explicit forces. During this paper, we have a tendency to propose a protected information recovery arrangement mistreatment CP-ABE for suburbanized DTNs wherever varied key forces manage their properties freely. We have a tendency to show the way to apply the projected half to firmly and proficiently touch upon the delineate information speckled within the information scattered within the Interference or disruption tolerant network.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cooperative Provable Data Possession for Multi-Cloud Server Storage
Authors : VIJAY KUMAR, CH.HARIKA, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
— Provable data possession (PDP) is a strategy for guaranteeing the trustworthiness of information away outsourcing. In this paper, we address the construction of a proficient PDP scheme for disseminated distributed storage to bolster the versatility of administration and information migration, in which we consider the presence of different cloud administration providers to agreeably store and keep up the customers' information. We display an cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash file indexing order. We demonstrate the security of our scheme based on multi-proven zeroknowledge proof system, which can fulfill culmination, information soundness, and zero-information properties. In addition, we verbalize execution optimization instruments for our scheme, and specifically exhibit a proficient technique for selecting ideal parameter qualities to minimize the computation expenses of customers and capacity administration providers. Our examinations demonstrate that our solution presents lower computation and communication overheads in comparison with non-helpful methodologies
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : In Service-Oriented MSN Providing Trustworthy Service Evaluation
Authors : D.RAMANJANEYULU, U.USHA RANI , , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients' surveys about its administrations without requiring any third trusted power. The administration surveys can then be made accessible to intrigued clients in settling on savvy administration choice choices. This paper portrays how the audit related normal dangers are destroyed and makes these surveys more fitting and valid. It portrays two frameworks bTSE and SrTSE, these frameworks are depicted to survey related issues and their suitable arrangements. The regular dangers of audits are Linkability, survey dismissal and change which are evacuated by utilizing bTSE; which makes utilization of tokens give incorporated surveys and the framework is progressed and the most vital risk called as Sybil assault is uprooted by utilizing SrTSE; which makes utilization of pseudonyms. Through execution assessment, we demonstrate that the bTSE accomplishes better execution as far as accommodation rate and defer than an administration audit framework that does not receive client collaboration.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Recommendation System for Find Friend on Social Networks.
Authors : B.NAGESH, CH.HARIKA, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
Social networks have become an unlimited source of information, for that several applications have been proposed to mine information from social networks such as: recommender systems. The rapidity and scalability of such a recommender algorithm is as important as the actual logic behind the algorithm because such algorithms generally run over a "huge" graph and implementing these normally would probably take a lot of time for recommending items even if there is one user. The basic idea of recommendation system is to recommend items to users. In this paper various recommender systems are classified are discussed. This paper focuses on providing the overview about the various categories of recommendation techniques developed till now. This paper we present review on recommendation system for find friend on social networks..
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Efficient Data Access Control for Multi-Authority Cloud Storage using CP-ABE.
Authors : PRAVEEN KUMAR, S.NAGA LAKSHMI, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
Security and data privacy is paramount to cloud users seeking to protect their gigabytes of vibrant business data from the inquisitive eyes of unauthorized users who are attempting to exceed their authority and also it becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is observed as one of the most seemly technologies for data access control in cloud storage, because it gives more direct control access strategies to the cloud data owners. This CP-ABE scheme provides intrinsic security mechanisms designed to minimize the security attacks and threats in cloud system. In this paper, we design a Fortified Access control for Multi-Authority Cloud Storage Systems, where the process of data access control is strengthened to ensure the safety of the cloud data. Fortified access control to discourse not only the data privacy difficulties in existing control scheme, by using multiple authorities in the cloud storage system, the proposed scheme can efficiently reaches the tenable access control and revokes the anonymous access to the cloud data. The study and simulation analysis illustrates that proposed well organized Fortified Access Control is both secure and efficient for Cloud Storage Systems.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy Preserving with Anonymous Authentication using Decentralized Access Control
Authors : M.Rajesh, Dr G Rama swamy, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
— the spearheading decentralized access control plan for vulnerable data storage in Cloud that backings unidentified confirmation. In the proposed plan, the Cloud checks the validness of the server without knowing the client's uniqueness before putting away data. The proposed outline concentrates on the full cycle access controlling plan wherein the displayed framework it was overlooked. Keeping in mind the end goal to accomplish secure access controlling plan we proposed fine-grained approach at cloud level, it keeps unapproved access controlling from clients or foes adequately our validation and access control plan is decentralized and solid, not at all like different access control plans intended for Cloud which are unified. The correspondence, calculation overheads are like unified methodologies. In addition, our proposed plan demonstrates that our framework has secure crypto instrument towards accomplishing data integrity and security.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Automatic and Systematic Methodology for Test Packet Generation
Authors : Prasanna, CH.Harika, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Assistant Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
As of late systems are becoming wide and more complex. In any case, managers use devices like ping and trace route to investigate issues. Consequently, we proposed a programmed and Systematic methodology for testing and investigating systems called Automated Test Packet Generation (ATPG). This methodology gets switch designs and creates a device autonomous model. ATPG create a couple set of Packet Generation to discover each connection in the system. Test bundles are sent as often as possible and it recognize disappointments to limit the issue. ATPG can distinguish both practical and execution (throughput, inertness) issues. We found, less number of Packet Generation is sufficient to test all principles in systems. For case, 4000 parcels can cover all tenets in Stanford spine system while 53 are sufficiently much to cover all connections.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Low Cost Multipurpose Camera
Authors : shahil tp, deepak joseph, sharon TOM, ,
Affiliations : B-Tech (Electronics and Communication Engineering) , Vimal Jyothi Engg. College Chemperi , Kannur ,Kannur university (AICTE)
Abstract :
today we are facing many problems with shortage of electricity, so we should develop new systems which use less electricity. Presently we have many security system which consumes electricity in large amount, also they are costly. To overcome this problem we developed a low cost multipurpose camera. With the invention of Raspberry pi, it’s easy to develop low cost multi –Purpose security camera. While compared to ordinary system our system has many advantages, this system has reduced power consumption, less memory is used, and any system can be changed into our system.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : BUS PASSENGER ALERT SYSTEM
Authors : Jerrin Yomas, Maneesha Unnikrishnan, Anju C. Justin, ,
Affiliations : Vimal Jyothi Engineering College, Chemperi
Abstract :
This is microcontroller based project. In this project we introduce a new system for bus passenger alert. The device that we make will automatically produce a sound message when we reach each bus station. It will also monitor the speed of the vehicle. If the speed exceeds a particular limit a message will be passed to the RTO office to take the necessary actions.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Ultra Stable Flying Robo
Authors : Anoop B K, Manoj K C, Antony Sebastian, Jinu Jose , Jithin M ,Mukunda Dasa K
Affiliations : ASSISTANT PROFESSOR, VIMAL JYOTHI ENGINEERING COLLEGE, CHEMPERI KANNUR
VIMAL JYOTHI ENGINEERING COLLEGE, CHEMPERI KANNUR
Abstract :
— Today we are running out of energy, out of resources, space, etc. high competition in the field for giving more service with lowest cost and maximizing the service. Innovations and inventions are taking place all over the world for delivering the service at lowest cost. The man mobility is decreasing and the work he can do from one place is increasing day by day. Here we are describing a flying object which can fly through the sky for multiple tasks with cheap maintaining costs. For example giving internet, television channels, parcel service, Traffic monitoring etc. are little while we consider the whole scenario. About the device, this device works with the solar energy incorporated with Lithium cells / NiCd Battery chemistries.. Idea by Bionic imitations. And this device has 8 legs which will be used for float movement. It also has gyroscope and accelerometer for steady movements. The attached GPS will enable the device positioning on to deferent geo locations. Communicating with the device is another crucial factor. So far we have two options for the movement. One is the pre allocated trip route set by GPS co-ordinates. Another one is that to establish a wireless RF connection with the device or using the available mobile networks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Smart Restaurant
Authors : Mrs. Bindu Sebastian, Athira Varghese, Megha Merin Jose, ,
Affiliations : ECE Department, Vimal Jyothi Engineering College,Kannur
Abstract :
Smart Restaurant is concept to realize the automation in restaurants or hotels. In this restaurant the kitchen people can get orders from each table through voice alert. This project consists of two sections one is transmitter section and other is receiver section. In our project we have designed an electronic system to order through RF based wireless communication using a menu card provided on each table. Touch panel is used here, which offers simple and multiple menus driven control panel. Mainly touch screen technology is used where control or settings of different parameters in wide manner. We can select the items shown in its display along with its price and can order the selected items through touch panel. The total cost of the items is also displayed. This order details are collected by wireless receiver placed in the kitchen and will display the items in its display along with the voice announcement through speaker. Each table has its own unique digital code. So the kitchen people can supply those items to that table after preparing it. This will give advantage to avoid the time delay usually experienced during bearer coming, collecting order and finally passes to the kitchen manually.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : TSUNAMI DETECTION SYSTEM
Authors : Mrs.Grace John , Athira P I, Sreedevi K, ,
Affiliations : ECE Department, Vimal Jyothi Engineering College,Kannur
Abstract :
The Tsunami waves cause considerable destruction and kills people . The detection section of the proposed system consists of a microcontroller, a vibration sensor to detect the Tsunami occurrence and a tilt sensor to monitor the sea waves. The principle is as follows, on the onslaught of Tsunami or any other natural calamity of this type , there is an abnormal pressure changes in the sea floor producing vibrations. Here a piezoelectric vibration sensor is used which gives an output depending on variations, and a microcontroller is used to announce the oncoming of Tsunami event to a concerned person, through the mobile computing. Mobile is used to give warning calls or send warning messages.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Review on Data Mining Techniques with Big Data
Authors : TEMPALLI NARENDRA BABU, R.MADHURI DEVI, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
AssociateProfessor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
The term Big Data comprises large- volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand- driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Automatic and Methodical approach for Test Packet Generation
Authors : BEJJANKI PRADEEPKUMAR, D.RAVI KIRAN, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
Professor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
Recently networks are growing wide and more complex. However administrators use tools like ping and trace route to debug problems. Hence we proposed an automatic and Methodical approach for testing and debugging networks called Automatic Test Packet Generation (ATPG). This approach gets router configurations and generates a device-independent model. ATPG generate a few set of test packets to find every link in the network. Test packets are forwarded frequently and it detect failures to localize the fault. ATPG can detect both functional and performance (throughput, latency) problems. We found, less number of test packets is enough to test all rules in networks.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted
Authors : A.Raghavendra Praveen Kumar, K.Tarakesh, U.Veeresh, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
The major aim of this paper is to solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) at the time of protecting exact method wise privacy in the cloud computing concept. Data holders are encouraged to outsource their difficult data management systems from local sites to the business public cloud for large flexibility and financial savings. However for protecting data privacy, sensitive data have to be encrypted before outsourcing, which performs traditional data utilization based on plaintext keyword search. As a result, allowing an encrypted cloud data search service is of supreme significance. In view of the large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their appropriate to these keywords. Similar mechanism on searchable encryption makes centre on single keyword search or Boolean keyword search, and rarely sort the search results. In the middle of various multi-keyword semantics, deciding the well-organized similarity measure of “coordinate matching,” it means that as many matches as possible, to capture the appropriate data documents to the search query. Particularly, we consider “inner product similarity” i.e., the amount of query keywords shows in a document, to quantitatively estimate such match measure that document to the search query. Through the index construction, every document is connected with a binary vector as a sub index where each bit characterize whether matching keyword is contained in the document. The search query is also illustrates as a binary vector where each bit means whether corresponding keyword appears in this search request, so the matched one could be exactly measured by the inner product of the query vector with the data vector. On the other hand, directly outsourcing the data vector or the query vector will break the index privacy or the search privacy. The vector space model facilitate to offer enough search accuracy, and the DES encryption allow users to occupy in the ranking while the popularity of computing work is done on the server side by process only on cipher text. As a consequence, data leakage can be eradicated and data security is guaranteed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Key Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage
Authors : K.Manohar, R. Anil Kumar, N.Parashuram, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different encryption keys to be used for different documents. On the other hand, this involves the need of securely distributing to users by a large number of keys for both encryption and search, and those users have to progress to store the received keys. The indirect need for secure communication, storage, and complexity clearly cause the unreasonable approach. In this paper, we concentrate on this practical problem, by suggesting the novel concept of key aggregate searchable encryption (KASE) and instantiating the idea through a real KASE scheme, in which a data owner wants to share out a single key to a user for distributing a large number of documents, and the user needs to present a single trapdoor to the cloud for questioning the shared documents.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Authors : C.Praveen Kumar, P Suman Prakash, Dr.S.Prem Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Data distribution is not at all easier with the progress of cloud computing, and an exact examination on the shared data offers a collection of profits both to the the public and individuals. Data distribution with a huge number of applicants must get into account numerous issues, counting effectiveness, data integrity and confidentiality of data owner. Ring signature is a capable applicant to build an unsigned and genuine data sharing system. It lets a data owner to secretly authenticate his data which can be set into the cloud for storage or scrutiny purpose. so far the expensive certificate authentication in the conventional public key infrastructure (PKI) surroundings becomes a restricted access for this solution to be scalable. Identity-based (ID-based) ring signature, which eradicates the method of certificate verification, can be utilized instead. In this paper, we additionally improve the safety of ID-based ring signature by giving advance security: If a secret key of any user has been compromise, all earlier produced signatures that contain this user still remains legal. This property is particularly significant to any huge scale data distribution system, since it is unfeasible to request all data owners to re-authenticate their data still if a secret key of one single user has been compromised. We offer an actual and well-organized instantiation of our scheme, demonstrate its safety and supply an accomplishment to illustrate its realism.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Dynamic Secure Group Sharing Framework in Public Cloud Computing
Authors : N.Mounika, N.Parushuram, R.Anil Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Cloud computing is the extended vision of computing as a effectiveness, where data owners can remotely store their data. The essential service presents by the Cloud is Data Storage. On the other hand, it is a tricky task for sharing data in multi-owner manner anywhere group admin and all group members can store and alter data while protecting data and identity privacy from an untrusted cloud server, due to the frequent change of the membership. so secure multi-owner data sharing scheme for dynamic groups in the cloud computing have been projected which absorb addition of group signature and broadcast encryption techniques. However this system also recognized some boundaries in terms of competence and security. since multi-owner data storing and sharing in a dynamic surroundings dumps enormous amount of data files in the cloud, which leftovers in cloud for imprecise period of time. The confidential information stored may changed by service providers. To maintain cloud file’s security and privacy regular elimination of unwanted files is needed. To determine this drawback we propose new framework which is Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud i.e MONA that remove unnecessary files automatically when the predefined time period for sharing specified by data owner has been run out which improve performance of the system in terms of security and efficiency. Also this method decreases the overhead at the time of upload and download file in the cloud. At last proposed method by name Multi Owner Data Sharing over Cloud (MODOC) declares required efficiency and most importantly security. We apply a working prototype of the MODOC method and assess its performance based on the time addicted during various operations the results give you an idea about that MODOC has the prospective to be effectively used for secure data sharing in the cloud.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Authors : G.Mercy Vimala, R.Vara Prasad, P.Rama Rao, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE<
Assistant Professor, Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
The Benefited from Cloud Computing, clients can achieve a flourishing and moderate methodology for information sharing among gathering individuals in the cloud with the characters of low upkeep and little administration cost. Then, security certifications to the sharing information records will be given since they are outsourced. Horribly, due to the never-ending change of the enrolment, sharing information while giving protection saving is still a testing issue, particularly for an untrusted cloud because of the agreement attack. In addition, for existing plans, the security of key dispersion depends on the safe communication channel, then again, to have such channel is a solid feeling and is difficult for practice. In this paper, we propose a safe information sharing plan for element individuals. Firstly, we propose a safe route for key dispersion with no safe correspondence channels, and the clients can safely acquire their private keys from gathering administrator. Besides, the plan can accomplish fine-grained access control, any client in the gathering can utilize the source in the cloud and refused clients can't get to the cloud again after they are rejected. Thirdly, we can protect the plan from trickery attack, which implies that rejected clients can't get the first information record regardless of the possibility that they scheme with the untrusted cloud. In this methodology, by utilizing polynomial capacity, we can achieve a protected client denial plan. At long last, our plan can bring about fine productivity, which implies past clients need not to overhaul their private keys for the circumstance either another client joins in the gathering or a client is give up from the gathering.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Survey on Dynamic Resource Allocation for Efficient Parallel Data Processing
Authors : B. Praveen Kumar, Santhosh Kumar, , ,
Affiliations : M.Tech (CSE), Sreyas Institute of Engineering & Technology
Associate Professor Dept.of Computer Science & Engineering, Sreyas Institute of Engineering & Technology
Abstract :
As recently ad-hoc parallel information handling has developed to be one of the executioner applications for Infrastructure as a service (IaaS) cloud. Most of the Distributed computing organizations have begun to coordinate systems for parallel information making ready in their item portfolio, making it straightforward for clients to get to these Infrastructure and to convey their projects. The preparing constitution which are right now utilized have been intended for static, homogeneous group setups and slight the specific way of a cloud. Subsequently, the dispensed figure assets may be lacking for huge parts of the submitted work and superfluously increment handling time and cost. In this paper we discuss the challenges for proficient parallel information handling in cloud and introduce our exploration venture Nephele. Nephele is the first information preparing structure to expressly neglect the dynamic quality portion offered by today's IaaS mists for each, trip booking and execution. In this paper we talk about the open doors and challenges for effective parallel information preparing Specific errands of a handling occupation can be doled out to distinctive sorts of virtual machines which are consequently instantiated and ended amid the employment execution. In view of this new structure, we perform amplified assessments of Map Reduce-roused preparing occupations on an IaaS cloud framework and contrast the outcomes with the mainstream information handling system Hadoop.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Avoid Link Failure Using Novel Re-routing Method
Authors : Batsala Balaraju, Sahukaru Jayavardhana Rao, , ,
Affiliations : M.Tech (CSE), Sri Vaishnavi College of Engineering at Srikakulam
Assistant Professor, Department of Computer Science & Engineering, Sri Vaishnavi College of engineering at srikakulam
Abstract :
In this paper we present a method to find a path when a link is failure when the data is transmitted for source node to destination node when a link Is failure before entering to the gate way protocol and to recover the response of failure the target application Is tested on small network up to tens of nodes for regional access of the service providers network which is one of the most challenging Task We provide and effective method to find the existing path for the Set of nodes to send the data when the link is failure.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : RFID BASED SHOPPING TROLLEY
Authors : Mrs.Lekshmy S, Ms.Aniltta T C, Ms.Nivya Shaji, ,
Affiliations : Department of ECE, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract :
While purchasing in super market we can gather items we want, put it in the container and at the time of billing only we come to know about the total cost. Also we need to stand in a queue for billing those items. To overcome this here we can design a RFID Based Trolley to make the purchase more easily and comfortable. An RFID Reader with electronics hardware system in fitted with the trolley to make the purchase comfortable. All the items are fitted with an RFID card whose price is fixed into the card. When an item is shown in front of the reader (fitted in the trolley) the amount for the item is added to the purchase bill and is shown on the LCD Display. It also has the provision for removing the items from the trolley where the cost is removed from the total cost. We can set a limit value for the purchase amount in the microcontroller, once the items are added the cost is added up and if it crosses certain limit it gives an alarm signal to indicate that. Along with this a search mode is also provided to the customer. By selecting search mode, customer can easily find out a product that the customer wants to search in the super market. MCU send data through RF module to the receiver side in the search mode if the particular product is selected using key pad. Send data is corresponds to product details that the customer wants to search in the super market. On receiver side, LED indication for corresponding data/product received will switch ON. Audio indication is also provided by MCU. 2.4 GHz open band wireless transceiver modules are used on receiver and transmitter which have range of 30m.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : SELF BALANCING ROBOT
Authors : Mrs.LEKSHMY.S, ALEESHA GEORGE, ATHIRA C.V, ,
Affiliations : Department of ECE, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract :
-In this paper, we presented the Balance model as a two wheeled self balancing robot that is capable of adjusting itself with respect to changes in weight and position. We developed the Balance System from a single gyroscope and a single accelerometer. The stability of the system is to show the capabilities of the ATmega328P in doing PID loops even with limited accuracy in position readings. PID control system is designed to monitor the motors so as to keep the system in equilibrium. It should be easily reproducible given the right parts and code
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Android controlled Smart Car
Authors : Jayesh George M, Adithya Sreyaj P P, Daniel Joseph, Sajeer P,
Affiliations : Vimal Jyothi Engineering College, Chemperi Kannur
Abstract :
A car is usually an electro-mechanical machine that is guided by computer and electronic programming. The car which can be controlling using an APP for android mobile. We are developing the remote buttons in the android app by which we can control the car motion with them. Here we use Bluetooth communication to interface controller and android. Controller can be interfaced to the Bluetooth module though UART. According to commands received from android the robot motion can be controlled. The consistent output of a robotic system along with quality and repeatability are unmatched.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Solar Power Smart Waste Bin
Authors : Mr. Jobin francis, Mr. Melbin TL, Mr. Praveen CN, ,
Affiliations : Vimal Jyothi Engineering College, Chemperi Kannur
Abstract :
India government recently introduced a new campaign named “SWACH BHARATH” that is aiming to make our country clean and tidy. That is, now the condition of our country is very bad in the field of waste management. There are many waste bins in our cities and country sides. But the reality is nobody using it in an effective way. As we all saw that in cities and streets the waste bin is there and all the wastes are near its side. The reason for this is, if one person deposit the waste outside of it, the person next coming to their will automatically throws the waste outside of the basket. This will continues. Our intention is to approach this problem in a different manner. If the lid of the waste bin opens automatically, when a person approaches to the waste bin then the person automatically deposit the waste inside it. No one has a tendency to throw the garbage outside the basket. That is our project “SOLAR POWERED SMART WASTE BIN “which is aimed to make our cities and streets clean and tidy.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : FPGA Based Efficient Implementation of Viterbi Decoder
Authors : BEERAM RAJ MOHAN REDDY, BELLAM VARALAKSHMI, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
Convolutional encoding is a forward error correction technique that is used for correction of errors at the receiver end. The Viterbi algorithm, which is the most extensively employed decoding algorithm for convolutional codes. In this paper, we present a Spartan XC3S400A Field- Programmable Gate Array efficient implementation of Viterbi Decoder with a constraint length of 3 and a code rate of 1/3. The proposed architecture can be realized by an Adaptive Viterbi Decoder having constraint length, K of 3 and a code rate (k/n) of 1/2 using Verilog HDL. Simulation is done using Xilinx ISE 12.4i design software and it is targeted into Xilinx Virtex-5, XC5VLX110T FPGA. The parameters of Viterbi algorithm can be changed to suit a specific application. The high speed and small area are two important design parameters in today’s wireless technology. In this paper, a high speed feed forward viterbi decoder has been designed using track back architecture and embedded BRAM of target FPGA. It shows that the larger the constraint length used in a convolutional encoding process, the more powerful the code produced.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design of an efficient aging aware reliable multiplier to reduce aging effects
Authors : BANDANADHAM BALA KRANTHI KUMAR, AL.SHABNA SAMANTHA TERA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
Digital multipliers are among the most critical arithmetic functional units. The Meanwhile, the negative bias temperature instability effect occurs when a pMOS transistor is under negative bias increasing the threshold voltage of the pMOS transistor, and reducing multiplier speed.. There are three types of multipliers Vedic multiplier base on Vedic arithmetic using Urdhva-Tiryabhyam sutra are proved to be the most efficient in terms of lower power consumption. overall performance of these systems depends on the throughput of the multiplier .A similar phenomenon, positive bias temperature instability, occurs when an nMOS transistor is under positive bias. Both effects degrade transistor speed, and in the long term, the system may fail due to timing violations. Therefore, it is important to design reliable high-performance multipliers. A multiplier is one of the chief hardware blocks in most digital and high concert systems such as microprocessors, digital signal processors. The CNFET-based multipliers have higher speed, and low power dissipation and it nearly reduces 99% PDP (power-delay product) as compared to the MOSFET In this paper, we propose an agingaware multiplier design with a novel adaptive hold logic (AHL) circuit. The multiplier is able to provide higher throughput through the variable latency and can adjust the AHL circuit to mitigate performance degradation that is due to the aging effect. Moreover, the proposed architecture can be applied to a column- or row-bypassing multiplier. The experimental results show that our proposed architecture with 16 ×16 and 32 ×32 column-bypassing multipliers can attain up to 62.88% and 76.28% performance improvement, respectively, compared with 16×16 and 32×32 fixed-latency column-bypassing multipliers
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and implementation of high speed 8 bit Vedic multiplier on FPGA
Authors : ANNAM ARAVIND KUMAR, SK. MASTAN BASHA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
In high speed digital signal processing units arithmetic logic units, multiplier and accumulate units, the multipliers are use as the key block. A systems performance is generally determined by the speed of the multiplier since multiplier is one of the key hardware component in high performance systems such as FIR filters, digital signal processors and microprocessors etc. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras. With the increasing constraints on delay, more and more emphasis is being laid on design of faster multiplications. The Array multiplier, Vedic 4*4 multiplier and 8*8 multiplier are designed, then 16*16 multiplier. These adders are called compressors. Amongst these Vedic multipliers based on Vedic mathematics are presently under focus due to these being one of the fastest and low power multiplier. In this paper a 4 X 4 Vedic multiplier is designed using reversible logic gates which is efficient in terms of constant inputs, garbage outputs, quantum cost, area, speed and power. The design is simulated using Verilog. Compressor based Vedic Multipliers show considerable improvements in speed and area efficiency over the conventional ones.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Geotechnical Strength of Randomly Oriented Fiber Reinforced Compacted Pond Ashes
Authors : V.ASRITH, G.VISWANATH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistant Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Fly ash is generated in large quantities as a byproduct of burning coal. Thermal power plants are the major sources of ash generation. Fly ash is disposed in the form of slurry in the ash ponds within the plant area, called coal combustion residue or pond ash. When fly ash is mixed with water, afterwards it gets hardened and forms high strength and low permeability material. Fly ash produced thus possesses both ceramic and pozzolanic properties. The power requirements of the country are rapidly increasing in pace with in industrial developments. Nearly, 73% of India‟s total installed power generation capacity is thermal of which coal based generation are nearly 90% (by diesel, wind, gas and steam adding about 10%). The inherent strength of the compacted pond ash mass reduces considerably due to saturation. In this context to improve and retain the strength of compacted pond ash, cementing agents like cement or lime may be very much beneficial. The stress-strain behavior of compacted pond ash mass can be modified by inclusion of fibre reinforcements. Fibre reinforcements also improve the strength characteristics of the mass. This paper presents the details of the pond ashes, the experiments carried out to characterize them when mixed with fiber and the results and discussions.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Strength and Durability Studies on Silica Fume in Slag Concrete
Authors : P.HARISH, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Portland cement, as an ingredient in concrete, is one of the widely used construction materials, especially in developing countries. The CO2 emission during its production and the utilisation of natural resources are important issues for the construction industry to participate in sustainable development. These days the waste materials of industries is on its way to increase day by day due to strict environmental policies and this waste contains SCMs generally. They can be utilised not only to improve properties of concrete but also to prevent pollution due to reduction in carbon dioxide emission. Steel slag aggregate generally exhibit a propensity to expand because of the presence of free lime and magnesium oxides hence steel slag aggregates are not used in concrete making. Proper weathering treatment and use of pozzolanic materials like silica fume with steel slag is reported to reduce the expansion of the concrete. The effect of oxide composition of the binder material used, on the strength and durability properties of concrete is also investigated.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Investigational Study on Bagasse Ash in Concrete by Partially Substitute with Cement
Authors : M.GANESH BABU, G.SHINY PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistant Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
The utilization of business and agricultural waste created by industrial processes has been the main focus of waste diminution analysis for economical, environmental, and technical reasons. Sugar-cane bagasse is a fibrous waste-product of the sugar refining industry, along with ethanol vapor. This waste product (Sugar-cane Bagasse ash) is already causing serious environmental pollution, which calls for urgent ways of handling the waste. Bagasse ash mainly contains aluminum ion and silica. In this paper, Bagasse ash has been chemically and physically characterized, and partially replaced in the ratio of 0%, 5%, 15% and 25% by weight of cement in concrete. Fresh concrete tests like compaction factor test and slump cone test were undertaken was well as hardened concrete tests like compressive strength, split tensile strength, flexural strength and modulus of elasticity at the age of seven and 28 days was obtained. The result shows that the strength of concrete increased as percentage of bagasse ash replacement increased.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Properties of Steel Fiber Reinforced Concrete Composites
Authors : K.SITA HEMANTH, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Concrete is generally utilized Construction material as a part of the world. Fiber reinforced concrete (FRC) is a concrete in which little and spasmodic filaments are scattered consistently. The filaments utilized as a part of FRC may be of distinctive materials like steel, G.I., carbon, glass, asbestos, polypropylene, jute and so forth. Half and half fiber can give support at all the scope of strains. Mix of low and high modulus strands can capture splits at miniaturized scale level and in addition full scale level. Overcome disservice of lower workability brought about because of utilization of just higher rate of steel filaments. Potential point of interest in enhancing concrete properties and decreasing the general expense of concrete creation. FRC has discovered numerous applications in structural building field. In light of the research facility investigate fiber reinforced concrete (FRC), block and barrels examples have been planned with steel fiber reinforced concrete (SFRC) containing strands of 0% and 0.5% volume part of snare end Steel filaments of 53.85, 50 perspective proportion and soluble base safe glass strands containing 0% and 0.25% by weight of bond of 12mm cut length were utilized without admixture. The outcomes got demonstrate that the expansion of steel fiber enhances the modulus of flexibility of concrete. It was additionally examined that by expanding the fiber volume portion from 0.5% to 1.5% and viewpoint proportion of strands from 50 to 71 there was a sound impact on modulus of versatility of Steel Fiber Reinforced Concrete.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : The Effect of Addition of Limestone powder and Granulated Blast Slag in Concrete
Authors : K.SAHITHI, G.SHINY PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistant Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
The comprehensive programme is taken up to study this ground granulated blast furnace aggregate used as a course aggregate in pavement concrete. In this, replacing the coarse aggregate to ground granulated blast furnace aggregate partially varying 0 to 50% and calculating maximum compressive strength and taking their corresponding Poisson's ratio and modulus of elasticity. Flexural strength of concrete mix decrease with increase in percentage (%) of GGBFS at the age of 7 and 28 days as compared to mix but it was nearly equal with increase in the percentage of GGBFS at the age of 56 days. The Spilt tensile strength of mix with different cement replacement 10%, 20%, 30%, 40%, showed in decrease for all replacement at 7 days and 28 days as compared to control mix due to slower rate of reaction. The Spilt tensile strength of the mix with 20%, 30% cement replacement better performed than control mix at 56 days. The results obtained from the study shows that the percentage (%) of GGBFS (10-40%) in concrete increased the Sulfate and Chloride resistance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Study and Analysis of Flexible Pavement by Nonlinear Finite Element Method
Authors : K.RAJESH, G.VISWANADH, , ,
Affiliations : ((M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistant Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Need for better road transportation facility is increasing day-by-day and in order to fulfill the need researches are carried out from a long period. Construction of a road becomes simple only after the design of a pavement is complete, today engineers are facing challenges in designing pavements that can serve a long duration without premature failures. Pavement design is one of the most important aspects of any transportation project. Poor and inadequate design may result to reduce the life of flexible pavement and increase the annual maintenance cost. It becomes the prime importance to design a durable and economic pavement structure. A durable structure can be designed only after proper analysis. Multilayered analysis is widely used but it assumes the pavement material to behave linearly which in practice is not true hence analysis of materials with nonlinear behavior is required. To obtain accurate response it is essential to analyse the pavement structure considering responses from each and every particle which is a tedious process with multilayered program, to make obtain accurate responses a powerful method like finite element method is used. In the present work an attempt has been made to study and analyse a pavement structure using a finite element based software tool and compare the results with that of a multilayer based program. Overall response helps in identifying the pavement parameters which has major impact on the performance of the pavement structure, by this it will be possible to design a pavement with long durability and high performance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and Construction of Driven Timber Piles and Foundations
Authors : K U M RAO, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Timber piles can also be driven for ground improvement, to densify loose granular soils. Although timber piles are rarely used on shore in the UK, in other countries notably the United States, Canada and Australia, they are used widely. For many structures, timber piles are a highly suitable choice of foundation, given appropriate ground conditions. They are economical, easy to transport, handle, cut to length and work with on site; and particularly suited for locations with access difficulties, or where excavations and the delivery of concrete would pose problems. Short, driven timber piles can be the solution for foundations in ground with a high water table, and where firm strata exists below surface material of loose sand, soft clays, or organic soils. In deep silt deposits, where the capacity of the pile is determined by shaft friction, timber piles are especially suitable being tapered and easy to splice. In Sweden and the Netherlands, timber piles are used below the water table, where they have proved practically invulnerable to decay, and extended to the surface using concrete sections. One of the suggested methods of reducing global warming has been to bury timber to create carbon dumps. Using timber for piled foundations would effectively achieve this.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Hybrid Neural Network Model for Compressive Strength of Reinforced Concrete
Authors : CH.BHAGYA LAKSHMI, G.SHINY PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistante Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
This paper focuses on the procedure of statistical assessment of test results in reference to the strength development of self compacting concrete and normally compacting concrete. A self compacting concrete and a normally compacting concrete (NCC) with similar ultimate compressive strength were developed. The concrete cubes were tested at 7, 28, 60, 90, 120 and 150 days after normal water curing. For each case 10 samples were tested and the test results were recorded for each sample on as obtained basis. To predict strength characteristics four input parameters namely water cement ratio, aggregate cement ratio, percentage of fibers and aspect ratio were identified. The results of the present investigation indicate that Genetic Algorithm based Artificial Neural Network (GANN) has strong potential as a feasible tool for predicting strength characteristics of steel fibre reinforced concrete.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Effect of Reinforcement Lap-Splices in SelfCompacting Concrete Beams
Authors : B.SRINIVASA RAO, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
The advancement of self-compacting concrete (SCC) was a noteworthy step towards adequacy at building sites, reasonably delivering pre-assembled concrete basics, enhanced working conditions and better quality and development of concrete structures. By expansion of filaments to SCC, bar fortification can be supplanted and the execution of concrete structures made strides. The variety of the bond quality along the streaming way for the diverse blends was assessed. The steel-concrete bond sufficiency was assessed in light of standardized bond quality. The outcomes demonstrated that the security quality was decreased because of Portland bond supplanting with dolomite powder. The expansion of either silica rage or fly fiery remains decidedly impeded further corruption as the dolomite powder content expanded. The SCC examples were cast without applying compaction, though the examples of ordinary concrete were cast by customary practice with generous compaction and vibration. The outcomes demonstrated that SCC examples created higher security to fortifying bars than ordinary concrete examples and the relationship between's security quality and compressive quality of NC is more predictable.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Investigation on Bacterial Cement Composites
Authors : M.DINESH KUMAR, G.VISWANATH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Assistant Professor, Dept. of Civil Engineering Priyadharshini Institute of Tech & Science
Abstract :
Concrete are the most important materials used in construction industries where the external forces more than the design loads mainly the lateral forces which leads to the deformation and produce cracks in the joints of the structural member. The usage of cement has been increased more over the world results in the air pollution which leads to the ozone depletion .To overcome these type of problem like crack formation and usage of cement content used for repair works can be reduced by using the self healing bacterial concrete. These are materials which heals the crack automatically when the cracks are formed. These self healing is achieved by means of using the Biological healing aspect by using the bacterial concrete. Bacteria are used during the mixing of concrete will cure the cracks the automatically by means of it screeds known as calcium carbonate precipitate. In these study horizontal forces are applied to the three storey single bay framed structure by means of using the hydraulic jack in which the cracks are formed in the framed structure mainly the cracks are formed in the Beam-Column Joints. The Cracks leads to the penetration of oxygen inside the reinforcement area will forms the Corrosion. To avoid the formation of corrosion the cracks bacterial concrete along with 60% of fly ash are used which results in self healing process. These self healing which cure and arrest the cracks in the structure which gives the environment free pollution and sustainable structure.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Experimental Study on Bagasse Ash in Concrete by Partially Replacement with Cement
Authors : T.MALYADRI, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
The utilization of industrial and agricultural waste produced by industrial processes has been the focus of waste reduction research for economical, environmental, and technical reasons. Sugar-cane bagasse is a fibrous wasteproduct of the sugar refining industry, along with ethanol vapor. This waste product (Sugar-cane Bagasse ash) is already causing serious environmental pollution, which calls for urgent ways of handling the waste. Bagasse ash mainly contains aluminum ion and silica. In this paper, Bagasse ash has been chemically and physically characterized, and partially replaced in the ratio of 0%, 5%, 15% and 25% by weight of cement in concrete. Fresh concrete tests like compaction factor test and slump cone test were undertaken was well as hardened concrete tests like compressive strength, split tensile strength, flexural strength and modulus of elasticity at the age of seven and 28 days was obtained. The result shows that the strength of concrete increased as percentage of bagasse ash replacement increased.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and Construction of Driven Timber Piles and Foundations
Authors : D.SREEKRISHNA, G.VISWANADH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Timber piles can also be driven for ground improvement, to densify loose granular soils. Although timber piles are rarely used on shore in the UK, in other countries notably the United States, Canada and Australia, they are used widely. For many structures, timber piles are a highly suitable choice of foundation, given appropriate ground conditions. They are economical, easy to transport, handle, cut to length and work with on site; and particularly suited for locations with access difficulties, or where excavations and the delivery of concrete would pose problems. Short, driven timber piles can be the solution for foundations in ground with a high water table, and where firm strata exists below surface material of loose sand, soft clays, or organic soils. In deep silt deposits, where the capacity of the pile is determined by shaft friction, timber piles are especially suitable being tapered and easy to splice. In Sweden and the Netherlands, timber piles are used below the water table, where they have proved practically invulnerable to decay, and extended to the surface using concrete sections. One of the suggested methods of reducing global warming has been to bury timber to create carbon dumps. Using timber for piled foundations would effectively achieve this.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Study of Behavior of Seismic Evaluation of Multistoried Building with Floating Column
Authors : SK.SHAMA BANU, G.SHANI PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
- In present scenario buildings with floating column is a typical feature in the modern multi-storey construction in urban India. Such features are highly undesirable in a building built in seismically active areas .This paper aims to investigate the effect of a floating column under earthquake excitation for various soil conditions and as there is no provision or magnification factor specified in I.S. Code, hence the determination of such factors for safe and economical design of a building having floating column. Sometimes, to meet the requirements these type of aspects cannot be avoided though these are not found to be of safe. Hence, an attempt is taken to study the behavior of the building during the seismic activity. In this study, the seismic behavior of the RC multistory buildings with and without floating column is considered. The analysis is carried out for the multi-storey buildings of G+3 situated at zone iv , Using ETABS Software. Linear Dynamic Analysis is done for 2D multi storey frame with and without floating column to achieve the above aim i.e. the responses (effect) and factors for safe and economical design of the structure under different earthquake excitation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Strength and Durability Studies on Higher Grade Concrete with High Volume Fly ash
Authors : SK.ROFA, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Portland cement, as an ingredient in concrete, is one of the widely used construction materials, especially in developing countries. The CO2 emission during its production and the utilization of natural resources are important issues for the construction industry to participate in sustainable development. These limitations led to the search for alternative binders or cement substitutes. Fly ash is finely divided residue resulting from the combustion of powered coal and transported by the flue gases and collected by electrostatic precipitator. There are multiple benefits for the sustainable development of the construction industry by using fly ash to increase the strength characteristics of structural members. The objective of the present investigation is to study the mechanical strength behavior of High Volume Fly ash concrete pavement slab. The optimum maximum coarse aggregate size for the best compressive strength of 28 day concrete was therefore found to be 8mm for the water/cement ratio of 0.63. The analysis further shows that as heterogeneity increases the compressive strength of concrete reduces.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and Analysis of Flexible Pavement by Nonlinear Finite Element Method
Authors : SK.NAYEEM, G.VISWANADH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Highway and pavement design plays an important role in the DPR projects. The satisfactory performance of the pavement will result in higher savings in terms of vehicle operating costs and travel time, which has a bearing on the overall economic feasibility of the project. A thorough analysis of the existing pavement is greatly required at this point of time, as an excessive amount of vehicle loads is passing through the project site and it is unknown whether or not the road pavement might sustain its structural integrity. The critical line of equal costs on the plane of CBR versus msa is also identified. This is a swing line which delineates the economic feasibility of two types of pavements. It has been found that the pressure vs settlement curve; pressure vs nodal stress curve ; pressure vs element stress curve are linear for small pressure range and then it become nonlinear. More nonlinearity is seen at higher pressure. Hence material nonlinearity must be considered while analysing and designing flexible pavements. This total work includes collection of data analysis various flexible and rigid pavement designs and their estimation procedure are very much useful to engineer who deals with highways.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Structural assessment for reinforced concrete elevated overhead water tank
Authors : SK.NASEEMA, G.SHANI PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Storage reservoirs and overhead tank are used to store water, liquid petroleum, petroleum products and similar liquids. The force analysis of the reservoirs or tanks is about the same irrespective of the chemical nature of the product. As from very offensive past records, many reinforced concrete elevated water tanks were collapsed or highly damaged during the earthquakes all over the world. General observations are pointing out the reasons towards the failure of supporting system which reveals that the supporting system of the elevated tanks has more critical importance than the other structural types of tanks. Most of the damages observed during the seismic events arise due to the causes like improper/unsuitable design of supporting system, mistakes during selection of supporting system, improper arrangement of supporting elements and/or underestimated demand or overestimated strength. The present work aims at checking the adequacy of water tank supported on shafts for the seismic excitations. The result shows that structure response is exceedingly influenced by different capacities of water tank and their one mass and two mass models and earthquake characteristics.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Strength Behavior of Mortar Using Slag as Supplementary Cementitious Material
Authors : N.M.VENKATESH, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Pozzolanic admixtures are generally being used along with the cement in concrete mixes so as to derive certain benefits like economy, durability, Chemical resistance in permeability etc. The use of high volumes of fly ash has become on of the current topics of research possibility promoted by the availability of a wide range of chemical and mineral admixtures. Test results of the study show that the designed strength was exceeded and that the ductility ratio and the safety margin against brittle failure of concrete containing these industrial by-products were comparable to those of the reference concrete (normal ordinary Portland cement concrete), proving the feasibility of using the waste materials as alternative construction materials. Different water-binder ratios ranging from 0.55 to 0.27are considered for investigation. From the results, the relationship is developed between Compressive Strength, Split Tensile strength and Flexural Strength of High Volumes of Slag Concrete. Test results show that strength increases with the increase of slag up to an optimum value, beyond which, strength values start decreasing with further addition of slag. Among the seven slag mortars, the optimum amount of cement replacement is about 40%, which provides 19% higher compressive strength and 25% higher tensile strength as compared to OPC mortar.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Experimental Study on Bacterial Cement Composites
Authors : M.HANUMANTH RAO, G.VISWANADH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Concrete in most structures is designed to crack in order to let embedded steel reinforcement take over tensile stresses. Crack formation is also a typical phenomenon related to durability. Percolation of cracks may lead to leakage problems or ingress of deleterious materials, causing deterioration of the concrete matrix or corrosion of embedded steel reinforcement. Durability can be enhanced by preventing further ingress of water and other substances. In recent years a bacteria-based self-healing concrete is being developed in order to extend the service life. A two component healing agent is added to the concrete mixture. The agent consists of bacteria and an organic mineral precursor compound. Self healing agents such as epoxy resins, bacteria, fiber are used to heal cracks in concrete. Among these, bacteria used in concrete are effective. When the bacteria is mixed with concrete the calcium carbonate precipitates forms and these precipitates filling the cracks and makes the crack free concrete. The state of art results in all projects show that material designed as self healing agents.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Effect of Aggressive Chemical Environment on Fly Ash Based Geopolymer Concrete
Authors : K.CHINNASUBBARAO, G.SHANI PRIYANKA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Concrete is the most widely used building material around the world because of the availability of raw materials, the simplicity in preparation and the moulding into different shapes. One of the main ingredients in a normal concrete mixture is Portland cement. It leads to the release of significant amount of CO2 and other greenhouse gases to pollute the atmosphere. Reuse and recycle of industrial solid wastes and by products in concrete is necessary to produce even “greener” concrete. The use of fly ash is more environmental friendly due to the reduced CO2 emissions and costs compared to OPC, which requires the burning of large quantities of fuel and the decomposition of limestone and can result in significant CO2 emissions. The test results indicate that the heat-cured fly ash-based geopolymer concrete has an excellent resistance to acid and sulphate attack when compared to conventional concrete. Thus we can say that the production of geopolymers have a relative higher strength, excellent volume stability and better durability. The experimental results reveal that the poisson’s ratio was in the range of 0.20 to 0.24 and modulus of elasiticity was in the range of 27 to 29 N/mm2.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Mechanical Properties of Steel Fiber Reinforced Concrete Composites
Authors : CH.JAI CHANDU, J.SUPRIYA, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
Concrete is most widely used construction material in the world. Fiber reinforced concrete (FRC) is a concrete in which small and discontinuous fibers are dispersed uniformly. The fibers used in FRC may be of different materials like steel, G.I., carbon, glass, aramid, asbestos, polypropylene, jute etc. Hybrid fibre can provide reinforcement at all the range of strains. Combination of low and high modulus fibres can arrest cracks at micro level as well as macro level. Overcome disadvantage of lower workability caused due to use of only higher percentage of steel fibres. Potential advantage in improving concrete properties as well as reducing the overall cost of concrete production. FRC has found many applications in civil engineering field. Based on the laboratory experiment on fiber reinforced concrete (FRC), cube and cylinders specimens have been designed with steel fiber reinforced concrete (SFRC) containing fibers of 0% and 0.5% volume fraction of hook end Steel fibers of 53.85, 50 aspect ratio and alkali resistant glass fibers containing 0% and 0.25% by weight of cement of 12mm cut length were used without admixture. The results obtained show that the addition of steel fiber improves the modulus of elasticity of concrete. It was also analyzed that by increasing the fiber volume fraction from 0.5% to 1.5% and aspect ratio of fibers from 50 to 71 there was a healthy effect on modulus of elasticity of Steel Fiber Reinforced Concrete.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Bond Strength of Reinforcement Lap-Splices in Self-Compacting Concrete Beams
Authors : B.GIREESH BABU, G.VISWANADH, , ,
Affiliations : (M.Tech) Structural Engineering, Dept. of Civil Engineering
Associate Professor, Dept. of Civil Engineering Priyadarshini Institute of Technology & Management
Abstract :
The development of self-compacting concrete (SCC) was a significant step towards effectiveness at building sites, realistically producing prefabricated concrete rudiments, improved working conditions and better quality and emergence of concrete structures. By addition of fibers to SCC, bar reinforcement can be replaced and the performance of concrete structures improved. The variation of the bond strength along the flowing path for the different mixes was evaluated. The steel-concrete bond adequacy was evaluated based on normalized bond strength. The results showed that the bond strength was reduced due to Portland cement replacement with dolomite powder. The addition of either silica fume or fly ash positively hindered further degradation as the dolomite powder content increased. The SCC specimens were cast without applying compaction, whereas the specimens of normal concrete were cast by conventional practice with substantial compaction and vibration. The results showed that SCC specimens generated higher bond to reinforcing bars than normal concrete specimens and the correlation between bond strength and compressive strength of NC is more consistent.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Efficient Document Annotation Using Content and Querying Value
Authors : DASARI MAHIDHAR, B.V.N.V.KRISHNA SURESH, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Assistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology
Abstract :
Persistently it is hard to locate the germane data in unstructured text documents. The organized data stays secured in unstructured text. Annotations as Attribute name-worth sets are more expressive for the recuperation of such documents. This system proposes a novel, particular, the alternative methodology for report recuperation which joins annotations recognizing confirmation moreover expands the ebb and flow structure using fuzzy search with vicinity positioning. This system recognizes the estimations of organized properties by scrutinizing, inspecting and parsing the exchanged documents. The searching system will make use of fuzzy search with closeness positioning for searching the customer captivated documents just. As needs are this system proposes an approach for capable file recuperation using practical routines.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Challenges in Big Data using Data Mining Techniques.
Authors : HIMABINDU MUTLURI, Mrs P.SUJATHA, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Associate Professor, Department of Computer Science & Engineering, NRI Institute of Technology
Abstract :
Big data is a massive accumulation of unstructured data where it can gather data from different sources like online networking, geological sources, and verifiable sources and so on. .With a specific end goal to separate the valuable data among unstructured stockpiling database, we utilize data mining strategies which coordinate enormous data properties. We utilize Big data Properties like HACE and Hadoop Procedures which uses parallel preparing to perform the data extraction errand in time which leads tedious process and create remove data in less time.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
Authors : G.Lucy, D.Jaya Narayana Reddy, R.Sandeep Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Assistant Professor, Department of Computer Science and Engineering G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Utilizing Cloud Computing, people can store their information on remote servers and permit information access to open clients through the cloud servers. As the outsourced information are liable to contain touchy protection data, they are regularly scrambled before transferred to the cloud. This, on the other hand, altogether restrains the ease of use of outsourced information because of the trouble of seeking over the encoded information. In this paper, we address this issue by building up the fine-grained multi-watchword hunt plans over scrambled cloud information. Our unique commitments are three-fold. To begin with, we present the significance scores and inclination elements upon watchwords which empower the exact catchphrase seek and customized client experience. Second, we build up a handy and exceptionally effective multicatchphrase inquiry plan. The proposed plan can backing entangled rationale seek the blended "AND", "OR" and "NO" operations of catchphrases. Third, we further utilize the ordered sub-lexicons procedure to accomplish better proficiency on list building, trapdoor producing and question. Finally, we examine the security of the proposed plans as far as secrecy of reports, security assurance of file and trapdoor, and unlinkability of trapdoor. Through broad investigations utilizing this present reality dataset, we approve the execution of the proposed plans. Both the security examination and test results show that the proposed plans can accomplish the same security level contrasting with the current ones and better execution as far as usefulness, question multifaceted nature and effectiveness.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Agent Based Interactions and Economic In an Intelligent Inter Cloud
Authors : K.Latha, D.Jaya Narayana Reddy, Dr.S.Prem Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
- Cloud is an interrelated worldwide "wave of Clouds" that make likely every Cloud to take advantage of assets of different Clouds. This is the most punctual work to devise an operator’s based Inter Cloud financial model for investigating shopper to-Cloud and Cloud-to-Cloud connections. While economic experiences in the middle of shoppers and Cloud suppliers are displayed as a numerous to-numerous arrangement, financial experiences among Clouds are demonstrated as a coalition diversion. To reinforce numerous to-numerous customer to-Cloud transactions, this work devises a novel association convention and a novel arrangement technique that is portrayed by both 1) Adaptive concession rate (ACR) and 2) Minimally sufficient concession (MSC). Scientific confirmations demonstrate that specialists receiving the ACR-MSC methodology arrange ideally on the grounds that they make least measures of concession. Via naturally controlling concession rates, observational results demonstrate that the ACR-MSC methodology is proficient in light of the fact that it accomplishes fundamentally higher utilities than the altered concession-rate time-subordinate procedure. To encourage the development of Inter Cloud coalitions, this work devises a novel four-stage Cloud-to-Cloud communication protocols and an arrangement of novel systems for Inter Cloud operators. Scientific confirmations demonstrate that these Inter Cloud coalition arrangement systems. 1) Converge to a sub contentment perfect balance.2) Result in each Cloud operators in an Inter Cloud coalition getting a result that is equivalent to its Shapley regard.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Secure Distributed Deduplication Systems with Improved Reliability
Authors : C.Kavitha Sree, CH.Shashikala, Dr.S.Prem Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Data deduplication is a method for removing duplicate copies of data, and has been extensively used in cloud storage to decrease storage space and upload bandwidth. On the other hand, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. Accordingly, deduplication system progress storage utilization while reducing reliability. In addition, the dare of privacy for sensitive data also take place when they are outsourced by users to cloud. Planning to address the above security test, this paper constructs the first effort to celebrate the idea of scattered reliable deduplication system. This paper recommends a new distributed deduplication systems with upper dependability in which the data chunks are distributed from corner to cornering multiple cloud servers. The safety needs of data privacy and tag stability are also accomplish by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Query Aware Determinization of Uncertain Objects
Authors : P.Jhancy, K.Lakshmi , Dr.S.Prem Kumar, ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering</br>Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
The main aim of this paper is to think about the trouble of determining probabilistic data to allow such data to be stored in legacy systems that agree only deterministic input. Probabilistic data may be produced by mechanized data analysis methods such as entity resolution, information extraction, and speech processing etc. The target is to make a deterministic depiction of probabilistic data that optimizes the excellence of the end-application built on deterministic data. We discover such a determinization problem in the background of two dissimilar data processing jobs – selection and triggers queries. Here approaches such as thresholding or top-1 selection usually used for determinization lead to suboptimal presentation for such applications. As an alternative, we expand a query-aware strategy and demonstrate its rewards over existing solutions through a complete empirical evaluation over real and synthetic datasets.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Anti Theft Tracking and Controlling Of Vehicle According Us
Authors : G.Prasanthi, A.Somasekhar, , ,
Affiliations : Dept of Electronics & Communication Engineering, Priyadarshini Institute of Technology & Sciences, Tenali
Associate Professor Dept of Electronics & Communication Engineering, Priyadarshini Institute of Technology & Sciences, Tenali
Abstract :
In MS Word 2007 used to layout altered, and it spared as “word 97-2003” for the PC, finishes creators with a large portion of the organizing determination required for get ready electronic rendition of their papers. Paper segments have been indicates for three reasons: 1. Usability when organizing singular papers. 2. Programmed consistence to electronic necessities that encourage the simultaneous or later generation of electronic items. 3. Congruity of style all through gathering procedures. A few parts, for example, multi-leveled mathematical statements, design, and tables are not endorsed, despite the fact that the different table content styles are given. The Formatter should make these parts, fusing the relevant criteria that take after.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Distance and Speed Calculation of Planes & Automobiles
Authors : B.Manogna , A.Somasekhar, , ,
Affiliations : Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali
Assistant professor Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali
Abstract :
The main purpose of this project on board dat aquisiton for vehicles uisng Advanced risc machine controller, now a days the data aquisiton especially plays an important role vehicles an military applications to monitor and control the activiteis .Here in this project we are including ultrasonic sensor which can detect and measure the distance of the vehicles,give to the controller so based on that we can estimate the and secure or protect the required things,if any object comes near to our vhicle it will detect gives an indication, while moving that time any object hit us it automaticlly stops the vehicle, here the vibration sensor detect the vibration and sends data to the Arm controller then Arm perfoms specfic functins and automatically stops the vehicle .Here we have one liquid crystal display it will displays everthing like obstacle distance ranges ,pressure etc
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : GSM Calculating the System of Automobiles in Their Safety Way
Authors : Y.Madhuri, G.Chennakesavulu, , ,
Affiliations : Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali
Assistant professor Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali
Abstract :
Microcontroller based advanced framework has been intended to screen the fuel level and aggregate sum of burden on the vessel. No heap, ideal burden And over burden are the three distinctive tanker burden levels.It stays in no heap status at introduction level when burden increments and still stay in ideal level then the framework inform groups to start voyage. When the heap increments to over burden then the framework gives caution and sends ready message to the control tower for important activity. The correspondence between the vessel and fundamental control tower is finished by GSM module to guarantee long separation solid correspondence. The tanker fuel level is observed in simple and computerized scale for the enhancements.Here in this task the vehicle fuel level demonstrating by the showcase and the signal sound, furthermore the over burden, of a vehicle which can be utilized identifies and demonstrates the outcomes.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Pure and Impurity Water Monitoring In All Accepts
Authors : T.Lakshman, A.Naga Lavanya, , ,
Affiliations : Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali.
Assistant professor Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali
Abstract :
Most critical substances on the earth are the abstract water. Postulation is utilized to characterize the water observing frameworks. Some examples of that is Tank water detecting checking, water contamination checking. We can maintain a strategic distance from the gigantic measure of water by utilizing wireless sensor technology. To demonstrate the level of water in the tank to specialists the PID microcontroller based water level observing is utilized. To check the water quality by utilizing these parameter, sensor based water pollution detection is used. Examples are the PH level, pressure, water level sensor and observe by a specialist. To observing framework utilizing and keep the water by utilize advanced everyday life gadget like portable workstation. Here we are using ph sensor for measuring the level of water quality and dampness sensor additionally.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Controlling the Applications through the Android Mobile
Authors : J.Krupachary, K.Krishna Mohan, , ,
Affiliations : Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali.
Assistant professor Dept of Electronics & Communication Engineering , Priyadarshini Institute of Technology & Sciences, Tenali.
Abstract :
Now a days embedded technology plays an important role in our daily life. These applications ease everyday existence of a typical man. The main purpose of this project Home Automation using through the wifi(wires less fidelity ) . In this paper, we propose configuration and model execution of home mechanization framework that uses Wi-Fi innovation and Android working framework. An attractive business sector for Home Automation Framework is for occupied families and people with physical confinements. Clients can control electrical machines in home or office through advanced mobile phone. Application will likewise give secure notices and alert to Burglary, fire dangers. This undertaking goes for controlling each event at home or office on your fingers. Here in this undertaking we are proposing the wifi module and heaps of electrical apparatuses .so by utilizing android versatile and the backing of the android application we are controlling the heaps furthermore we can control every one of the applications that we expected to the home or other specific spots.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Implementing CP-ABE Scheme for Decentralized Disruption-Tolerant Military Networks
Authors : N.Anjali, A.Harshavardhan, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science for women’s
Assistant Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science for Women’s
Abstract :
Compact centre points in sure circumstances, as an example, a forefront or a hostile region area unit indebted to expertise the evil impacts of broken framework system and never-ending bundles. Intrusion tolerant framework (DTN) progressions have gotten the chance to be productive plans that enable remote contraptions passed on by troopers to speak victimization on an individual basis and provides permission to personal proof or charge unfailingly abuse outside limit centre points. Irrefutably the foremost hard problems during this circumstance area unit the approval of endorsement methodologies and their courses of action plan for secure knowledge convalescence. Figure content methodology property provides coding promise rejoinder to channel mechanism topics. Regardless, of topics to use for CP-ABE in localized Intrusion tolerant framework (DTN) presents some security and insurance difficulties regarding the standard disclaimer, fake, and direction of qualities assigned from clear forces. we have a tendency to suggest AN ensured knowledge convalescence arrangement victimization the talent for distributed DTNs anyplace varied key forces fare their dangers self-sufficiently. we offer security to {the knowledge the info the information} that we've sent victimization distributed data. it's utilized in secure transmission of information for nations defence
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Efficient Network Recovery Scheme for a node or Link failure using Multiple Standard Routing Configurations
Authors : Sambi Reddy Kalli, Dr G Rama Swamy, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
As the Internet takes an increasingly central role in our communications infrastructure; the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC). Our proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. In this paper we present MRC, and analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Enhanced Dynamic Secure group Sharing Using OTP in Public Cloud
Authors : Y. Rajesh Babu, U.Usha Rani, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science
Abstract :
- In cloud computing outsourcing, cluster quality among cloud shoppers could be a noteworthy check, thus cloud computing offers a token effort and everyone around sorted out the arrangement. Thanks to incessant modification of participation, sharing info during a exceedingly in a very} multi-owner manner to an un-trusted cloud continues to be its testing issue. During this paper, we tend to planned a protected multi-owner info sharing arrange for a dynamic cluster in folks, in general, cloud. By furnishing AES cryptography with convergent key whereas transferring the data, any cloud shopper will safely impart info to others. Within the in the meantime, the capability overhead and cryptography calculation expense of the arrange area unit free with the number of disowned shoppers. Also, I break down the protection of this arrange with thorough confirmations. One-Time Secret word is one in all the best and most well-known varieties of confirmation which will be utilized for securing access to accounts. One-Time Passwords area unit oftentimes alluded to as secure and a lot of grounded varieties of confirmation in an exceedingly multi-owner manner. Broad security and execution examination demonstrates that our planned arrange is deeply productive and fulfills the protection requirements for open cloud-based secure cluster sharing.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Novel Architecture for Matching the Data Protected With an Error-Correcting Code (ECC)
Authors : Sk.Parvin Bhano, T.Vineela, , ,
Affiliations : (M.Tech) –VLSI & ES, Dept of ECE, Vasireddy Venkatadri Institute of Technology (VVIT),
Assistant Professor, Dept of ECE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (V), Guntur(Dt),Andhra Pradesh, India.
Abstract :
In this paper we presented a novel architecture for matching the data protected with an Error-Correcting Code (ECC) which proposed to reduce latency and complexity where Data comparison is widely used in computing system to perform so many operations. Where incoming information is needs to be compared with a piece of stored data to locate the matching entry. If both incoming bits and stored bits are matching means there is no error if mismatched means some type of error will occur like random error or burst error. To detect and correct the error here error correcting codes are used. To further reduce the latency and complexity, in addition, a new butterfly-formed weight accumulator (BWA) is proposed for the efficient computation of the Hamming distance and also demonstrates LDPC coding and decoding for Error Correcting Codes further more examines whether the incoming data matches the stored data if a certain number of burst errors are corrected.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Novel Design for Encoding and Decoding to Minimize Crosstalk in VLSI Circuits
Authors : J.Prema, Akash Venkatachalam, , ,
Affiliations : M.Tech
B.Tech SRM UNIVERSITY
Abstract :
In the developing world much know-how are growing faster and faster as they are becoming reduced, one such is the very large scale integrated design-VLSI. Many trials are faced in VLSI, among them is the crosstalk frequency. Global buses in deep-submicron (DSM) system-on-chip designs Ingest noteworthy extents of power, have large transmission interruptions and are prone to errors due to DSM noise-crosstalk. Owing to this, crosstalk manifestation on long on-chip buses is progressively becoming a limiting factor in high-speed designs. Crosstalk among nearby wires on the bus may create a remarkable portion of the transmission delay. Placing a guard wire between each signal wire assuages the crosstalk problem but doubles the area used by the bus, which is an objectionable concern. Instead, it is proposed to employ data encoding and decoding for special codes called boundary shift codes to abate crosstalk inside a bus.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Structure of Adaptive Mobile Video Streaming and Methodical Social Video Sharing In the Cloud
Authors : Gattu Uma Maheswari, E Ramya, , ,
Affiliations : M.Tech(CSE) Department of Computer Science & Engineering, Arjun College of Technology and Science
Associate Professor, Department of Computer Science & Engineering, Arjun College of Technology and Science
Abstract :
For the reasons of high information stream of video traffics over versatile systems, the remote connection limit neglects to keep up the pace with the interest. There exists a crevice between the interest and the connection limit which brings about poor administration nature of the video gushing over versatile systems which incorporates interruptions and long buffering time. Taking after the distributed computing innovation, we propose two arrangements: AMoV (versatile portable video gushing) and ESoV (proficient social video sharing). A private operator is developed for every portable client in the cloud which conform the video bit rate utilizing versatile video coding system taking into account the arrival estimation of the remote connection condition. ESoV and AMoV make a private go between to give video spilling administrations proficiently for each versatile customer. For a specific customer, AMoV gives her a chance to mystery specialists/middle person adaptively change her/his gushing pour with a versatile video coding technique relied on upon the reaction of connection prevalence. Too, effective social video sharing watches the interpersonal organization colleagues among portable customers and their own middle people attempt to share video satisfied ahead of time. We understand the AMES-Cloud system model to uncover its presentation. It is demonstrated that the secret specialists in the mists can effectively give the versatile gushing, and taking into account the informal organization learning accomplish video sharing.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networks
Authors : Kumara Swamy, E Ramya, , ,
Affiliations : M.Tech (CSE) Department of Computer Science & Engineering, Arjun College of Technology and Science
Associate Professor, Department of Computer Science & Engineering, Arjun College of Technology and Science
Abstract :
Specially appointed low-control remote systems are an energizing exploration bearing in detecting and pervasive processing. Former security work here has concentrated basically on disavowal of correspondence at the steering or medium access control levels. This paper investigates asset exhaustion assaults at the directing convention layer, which for all time handicap systems by rapidly depleting hubs' battery power. These "Vampire" assaults are not particular to a particular convention, yet rather depend on the properties of numerous well known classes of steering conventions. We find that all analyzed conventions are vulnerable to Vampire assaults, which are pulverizing, hard to distinguish, and are anything but difficult to do utilizing as few as one malevolent insider sending just convention agreeable messages. In the most pessimistic scenario, a solitary Vampire can expand system wide vitality use by a variable of O (N), where N in the quantity of system hubs. We talk about systems to moderate these sorts of assaults, including another verification of-idea convention that provably limits the harm created by Vampires amid the parcel sending stage.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Robust Module based Information Management
Authors : M Vinaykumar Reddy, S Rajeshwar, , ,
Affiliations : M.Tech (CSE) Department of Computer Science & Engineering, Arjun College of Technology and Science
Associate Professor, Department of Computer Science & Engineering, Arjun College of Technology and Science
Abstract :
The current development in support of structuring associate ontology-based knowledge management system is to require advantage of efforts that were created to intend pre-existing knowledge management systems. In our work we have a tendency to expand ancient definitions of modules and that we established new properties of strength that provide suggests that for checking merely that a strong module-based knowledge management systems evolves firmly relating to each schema additionally as knowledge of the reference knowledge management systems. Differing from ancient works, we've thought-about issue of safe personalization of modules that square measure engineered from existing reference knowledge management systems. In our work, we have a tendency to go back the reprocess of reference ontology-based knowledge management systems so as to place up novel knowledge management systems with precise desires. Typical definitions of modules in literature essentially resort to idea of conservative extension of a schema as an alternative for obtaining relating to non-interesting relations of a schema.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : OBD – II and Vehicle Evaporative System: Study on conversion of a fluid into vapour
Authors : Dr. Porag Kalita, , , ,
Affiliations : Head: Automobile Engineering Department,Vocational Education (+2), M R S Higher Secondary School, Titabor, Jorhat, Assam, India
Abstract :
Evaporative system, it is a system meant to prevent the escape of petrol vapors from the fuel tank or carburetor float bowl to the atmosphere while the engine is off. The vapors are stored in a canister or in the crankcase until is started. OBD-II, systems were designed to maintain low emissions of in use vehicles, including light and medium duty vehicles. The OBD-II diagnostic system shall control the air flow of the complete evaporative system. In addition, the diagnostic system shall also monitor the complete evaporative system for the emission of Hydrocarbon vapor into the atmosphere by performing a pressure or vacuum check of the complete evaporate system. From time to time, manufactures may occasionally turn off the evaporative purge system in order to carry out a check.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Hand Tracking in HCI Framework Intended For Wireless Interface
Authors : Aniket Kumbhar, Vipul Sathe, Aniket Pathak, Prof.M.K.Kodmelwar,
Affiliations : Department of Computer Engineering BSCOER ,Narhe ,Pune Maharashtra, India
Abstract :
Despite significant progress in technology the interaction between human and computer goes traditional way. However, HCI framework introduced various ways to interact. To support the unfamiliar user we are creating platform by use of infrared LEDs and Wii-mote which leads us to sense the hand movement through infrared sensor. Moreover, we are emphasizing on usability in other various fields such as 3D image, gaming to have better and simpler interaction.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : Novel Design of Low Power Comparator Using Reversible Gates
Authors : IMMADISETTY SIVA PARVATHI, G.VASANTH RAO, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Science For Women
Abstract :
Reversible logic has shown potential to have extensive applications in emerging technologies such as quantum computing, optical computing, quantum dot cellular automata as well as ultra low power VLSI circuits. The classical logic gates such as AND, OR, EXOR and EXNOR are not reversible. In the existing literature, reversible sequential circuits designs are offered that are improved for the number of the garbage outputs and reversible gates. Minimizing the number of garbage is very noticeable. This paper presents a novel design of reversible comparator using the existing reversible gates and proposed new Reversible BJN gate. All the comparators have been modeled and verified using VHDL and ModelSim. A comparative result is presented in terms of number of gates, number of garbage outputs, number of constant inputs and Quantum cost. The design is useful for the future computing techniques like quantum computers. The proposed designs are implemented using VHDL and functionally investigated using Quartus II simulator.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : ASIC Design of Reversible Full Adder and Multiplier Circuits
Authors : CHADARASUPALLI NAGA LAKSHMI, P T BALAKRISHNA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Science for Women
Abstract :
Reversible logic has become one of the most promising research areas in the past few decades and has found its applications in several technologies; such as low power CMOS, nano-computing and optical computing. The problem of minimizing the number of garbage outputs is an important issue in reversible logic design. In this paper we propose a new 4×4 universal reversible logic gate. The proposed reversible gate can be used to synthesize any given Boolean functions. We also gain better improvements in terms of power and area when compared to conventional adders and multipliers. The implemented designs are simulated using NC launch and synthesized by RTL compiler. We also gain better improvements in terms of power and area when compared to conventional adders and multipliers. The implemented designs are simulated using NC launch and synthesized by RTL compiler. In this paper we have used Peres gate and the proposed Modified HNG (MHNG) gate to construct the reversible fault tolerant multiplier circuit
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Integrity Auditing for Outsourced Dynamic Cloud Data with Group User Revocation
Authors : P.FARZANA, A.HARSHAVARDHAN, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Science for women’s
Assistant Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science for women’s
Abstract :
The imminent of the cloud computing makes storage outsourcing turns into a rising pattern, which advances the privacy for remote data auditing an intriguing issue that showed up in the literature. Recently a few researchers consider the issue of secure and productive public data respectability auditing for shared dynamic data. Be that as it may, these schemes are still not secure against the conspiracy of cloud storage server and revoked group users amid client denial reasonable cloud storage framework. In this paper, we make sense of the understanding attack in the presented system and give an adept public auditing scheme with secure group client repudiation in view of Asymmetric Group Key Agreement and group signature. Our Scheme supports effective dynamic user revocation with public auditing.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Content Leakage Detection for Trusted Delivery Networks using DRM Technology
Authors : LAKSHMANA CHARI, Dr G. RAMA SWAMY, , ,
Affiliations : (M.Tech) CSE, Dept. of Computer Science and Engineering
Professor, Dept. of Computer Science and Engineering Priyadarshini Institute of Technology & Science
Abstract :
As the rapid development of broadband technologies and the advancement of high-speed networks, Multimedia streaming applications and services are becoming popular in recent a year, that’s why issue of trusted video delivery to prevent the undesirable content leakage become critical. The protection of the bit stream from unauthorized use, duplication and distribution is the key concern in video streaming services. The conventional Systems addressed this issue by proposing methods based on observation of streamed traffic throughout the network and Digital Rights Management (DRM) is one of the most popular approaches to prevent undesirable contents distribution to unauthorized users. The job of maintaining high detection accuracy while coping with traffic variation in the network is done by conventional system. But detection performance of conventional system degrades to the significant variation of length of the video. To overcoming this issue we are proposing a novel leakage detection of content scheme that is robust to the variation of the length of the video. Thus, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video The effectiveness of proposed scheme is evaluated in terms of variation of video length, delay variation, and packet loss. Also, increased in bandwidth, which enhance the performance of transmission, include a module to enhance the performance of overall system.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Key-Aggregate Crypto System for Reliable Outsourced Data among Public Cloud
Authors : SHOBAN DEVARAPALLI, R.MADHURI DEVI, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
AssociateProfessor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
The capacity of in particular sharing encrypted data with divergent to clients through public cloud storage may truly ease security trouble, by plausibility data uncover in the cloud. A key test to plan such encryption thought lies in the very much sorted out administration encryption keys. The favored adaptability of distributing any attaining so as to gather reports with any gathering of clients weight distinctive encryption keys to be utilized for diverse archives. Then again, this includes the need of safely disseminating to clients by a substantial number of keys for both encryption and seeks, and those clients need to advance to store the got keys. The aberrant requirement for secure correspondence, storage, and many-sided quality plainly cause the outlandish methodology. In this paper, we focus on this viable issue, by recommending the novel idea of key aggregate searchable encryption (KASE) and instantiating the thought through a genuine KASE plan, in which a data proprietor needs to share out a solitary key to a client for disseminating an extensive number of reports, and the client needs to display a solitary trapdoor to the cloud for scrutinizing the mutual archives.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Augmenting Privacy for Cloud users through Advanced Access Control Scheme for MultiAuthority Cloud Storage
Authors : NADAKUDITI MALLIKHARJUNA SWAMY, K.KIRAN KUMAR, , ,
Affiliations : M.Tech (CSE), Priyadrshini Institute of Technology & Management
AssociateProfessor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Abstract :
Day to day Cloud Computing is expanding massively because of its favorable position of giving adaptable storage prerequisite. The clients are begun to share their touchy data through the cloud because of its tendency of giving accommodation to clients. The security of the data must be guaranteed to the clients while putting away their subtle elements into the cloud server. In the current work an expressive, proficient and revocable data access control plan for multi-power distributed storage frameworks are proposed to bolster the power access control get from the numerous property powers. The clients the individuals who are having coordinating properties as in the access approach defined in the figure content can recover the whole data content. It intends to permit the clients with qualified credits to unscramble the whole data put away in the cloud server. On the other hand, it can't constrain the clients from accessing the data's which are not accessible to them. That is it can't restrict the data access control to the approved clients. In this work a novel calculation to be specific Security improved Data Access Control Plan is proposed to defeat the issue exist in the current work. In the current work data, access control is constrained to the client from the unapproved clients though in the proposed calculation plan to restrict the data access control to the approved client.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Performance Analysis of High Speed CMOS Full Adder Circuits For Embedded System
Authors : MUDRABOYINA SRINIVASA RAO, BELLAM VARALAKSHMI, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assistant Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
The full Adder is designed using CMOS logic style by dividing it in three modules so that it can be optimized at various levels. First module is an XOR-XNOR circuit, which generates full swing XOR and XNOR outputs simultaneously and have a good driving capability. The main motive is to determine the comparison of power, surface area and complexity of Full adder designs using CMOS Logic Styles. Logic style affects the switching capacitance, transition activity, short circuit current and delay. Various logic styles have been compared taking full adder as a reference circuit and power dissipation and delay as reference parameters. Full adder Design is better compared to conventional design. Transistor Design with respect to power, delay, Power Delay Product Comparison. It is observed that less power is consumed in the Transmission based full adder than the Convention full adder and Pass Transistor full adder.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : DRAM based on Self Controllable Voltage Level Technique for Leakage Power in VLSI
Authors : M S V D RAJU KUNAPAREDDY, Y.KONDAIAH, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
Today trend is circuit characterized by reliability, low power dissipation, low leakage current, low cost and there is required to reduce each of these. Increase of chip complexity is consistently higher for memory circuits. The salient features such as low power, reliable performance, circuit techniques for high speed such as using dynamic circuits, and low leakage current, most of these have get give a better advantage. Power must be added to the portable unit, even when power is available in non-portable applications, the issue of low-power design is becoming critical. Thus, it is evident that methodologies for the design of high-throughput, low-power digital systems are needed. Since there is no additional circuitry needed for power reduction in this circuit design technique, there is no additional circuitry needed for power reduction Here 3T DRAM is implementing with self controllable voltage level (svl) technique is for reducing leakage current in 0.12um technology. The simulation is done by using microwind 3.1 & dsch2 and gives the advantage of reducing the leakage current up to 57%.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : IMPLEMENTATION OF HARDWARE IP ROUTER BASED ON VLSI
Authors : K RAMA SUBBA RAO, SK. MASTAN BASHA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Assitant Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
A Network-on-chip is a new paradigm in complex system-on-chip designs that provide efficient on chip communication networks. It allows scalable communication and allows decoupling of communication and computation. The data is routed through the networks in terms of packets. We attempts to overcome latency and time reduction issue and can provide multipurpose networking router by means of verilog and it was synthesized in Xilinx 13.2 version, simulated Modelsim 10.0 version. In this paper our attempt is to provide a multipurpose networking router by means of Verilog code, by this we can maintain the same switching speed with more secured way of approach we have even the packet storage buffer on chip being generated by code in our design in the so we call this as the self-independent router called as the VLSI Based router. The three architectures were analyzed for their performance in terms of delay, throughput and latency and we concluded that CDMA router performs better than the other two.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and implementation of carry select adder for 128 bit low power
Authors : DOMA ANISHA RANI, AL.SHABNA SAMANTHA TERA, , ,
Affiliations : (M.Tech) VLSI, Dept. of ECE
Associate Professor, Dept. of ECE Priyadarshini Institute of Technology & Management
Abstract :
Carry Select Adder is a prompt adder that is employed in processing of data processors for functioning quick arithmetic functions. Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, the scope is to reduce the area of CSLA based on the efficient gate-level modification. In this paper 128 bit Regular Linear CSLA, Modified Linear CSLA, Regular Square-root CSLA (SQRT CSLA) and Modified SQRT CSLA architectures have been developed. To decrease area with insignificant speed penalty, set up a multiplexer basis add one circuit was projected. Based on this modification a new modified 32-Bit Square-root CSLA (SQRT CSLA) architecture has been developed. The modified architecture has been developed using Common Boolean Logic (CBL). The area of proposed design illustrates a decrease in support of 128-bit sizes which indicates attainment of method and not an easy trade-off of obstruction for area.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Provable Data Possession using IBE in Multi cloud storage
Authors : NALLAMEKALA HEMANTH, K.KIRAN KUMAR, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Management
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Management
Abstract :
In distributed computing frameworks, information proprietors normally store immense volume information on the cloud servers in this way customers may get to the information from Cloud servers without knowing their areas in this association outsourcing customer information among untrusted cloud servers, dependable check, proficient information outsourcing and framework execution is a testing issue .keeping in mind the end goal to address the above issues we utilize Centralized Cloud Service Provider to enhance the System Performance by decreasing the time unpredictability .Therefore, every Client solicitation is overseen by concentrated Cloud Service Provider. With a specific end goal to give the dependable check amid transferring and downloading User needs to answer the Security Question. Security Questions and Answers are given by client amid the enrollment stage. So amid Uploading/Downloading operation If client is typical then he can answer that security questions on the off chance that he/she is interloper then he/she can't answer that inquiries. In this manner, utilizing this we can give more Security. Additionally, we can give the Security to transferred information and the condensation by utilizing the encryption calculation in this manner we can accomplish productive information out sourcing with information uprightness. Besides, the honesty test convention must be proficient keeping in mind the end goal to spare the verifier's expense.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Detecting Illegal Redistribution for Trusted Content Delivery Networks
Authors : VENKATA SATYANARAYANA K, R.MADHURI DEVI, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Management
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Management
Abstract :
- As of now the ubiquity of sight and sound applications and administrations are taken top position. Hence the issue of conveyance trusted substance turns out to be exceptionally basic i.e. content spillage [1], content ridiculed, and illicit redistribution and bundle misfortune. While tending to these issue and proposing so as to give vigorous spilling execution gushing movement based calculations and avert illicit redistribution of substance between clients to organize which has been finished by unapproved clients. In this paper we have kept up a high location exactness [4] to get content spillage and we are protecting that to send trusted substance to certain destination without outside impact upon substance. Because of absence of gushing execution some time, we lose the information. Along these lines we have drawn consideration over the using so as to gush convention to propose this issue spilling conventions while concentrating on spilling activity in systems. One of the significant issue has been evacuated by this paper is illicit redistribution by proposing method don't influence unique substance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Revocable Data Access Control in Public Cloud
Authors : ASHOK NAGASAI MANCHALLA, D.RAVIKIRAN, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Management
Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Management
Abstract :
A new suburbanised access management theme for secure information storage in clouds that support anonymous authentication. Throughout this theme, the cloud verifies the credibility of the user whereas not knowing the user’s identity before storing information and in addition has added the feature of access management throughout that entirely valid user’s square measure able to rewrite the hold on knowledge. The theme prevents reply attack and supports creation, modification, and reading the data hold on inside the cloud user and in addition have the address user revocation. Moreover, our authentication and access management theme is suburbanised and durable, in distinction to different access management schemes designed for clouds that square measure centralized. The communication, computation, and storage overheads square measure resembling centralized approaches. If the user does not have credentials to urge the key and incorrectly coming back into key to access the file implies that persona non grata identification activates the system to transfer a faux file to the persona non grata and inform to the administrator of the system thus the land in addition the} user United Nations agency created that file is attempt to access and conjointly hide the attribute and access policy of a user.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : TAST Model for Travel Package Recommendation
Authors : INDLA IRMIYA, K.KIRAN KUMAR, , ,
Affiliations : M.Tech (CSE), Priyadarshini Institute of Technology & Management
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Management
Abstract :
Last few years ago a business needs travel, and generally that's lots of the time for created sensible packages and appropriate to customers. This paper provides a study of exploiting on-line travel info for customized travel package recommendation. A vital challenge on this line is to handle the distinctive characteristics of travel information that differentiate packages from ancient things for recommendation. Period of time has connected within the analysis domain of ITS. Cluster Strategy is used as a prevailing tool of discovering hidden data which will be applied on historical traffic information to predict correct period of time. A vital challenge on this line is to handle the distinctive characteristics of travel information that distinguish travel packages from ancient things for suggestion. This TAST model will represent travel packages and tourists by distributions. In MKC approach, a collection of historical information is portioned into a bunch of meaning sub-classes (also referred to as clusters) supported period of time, frequency of travel of period of time and velocity for specific road phase and time cluster. we tend to extend the TAST model to the TRAST model for capturing the latent relationships among the tourists in every travel cluster. The TAST model, the TRAST model, and also the cocktail recommendation approach on the real-world travel package information. TAST model will effectively capture the distinctive characteristics of the travel information and also the cocktail approach is, thus, rather more effective than ancient recommendation techniques for travel package recommendation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Typicality Based Content-Boosted Collaborative Filtering Recommendation Framework
Authors : N.SATISH KUMAR, SUJAN BABU VADDE, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Assistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology
Abstract :
Collaborative filtering (CF) is significant and admired technology for recommender systems. Recommender frameworks have been turned out to be significant means for web online clients to adapt to the information overload and have ended up a standout amongst the most effective and prevalent tools in electronic commerce. Recommending and personalization are critical ways to deal with combating information overload. Machine Learning is an imperative piece of frameworks for these assignments. Collaborative filtering has issues, substance based routines address these issues integrating both is best.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Study on Secure Data Retrieval for Decentralized DTMN
Authors : P.A.N Chakravarthy , Dasari Vinay Kumar, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Assistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology
Abstract :
DTMN advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based Encryption. Indisputably the most difficult issues in this state are the prerequisite of endorsement arrangements and the methodologies redesign for secure data recovery. Then again, the issue of applying in decentralized DTMN presents a couple of securities and insurance challenges as to the property disavowal, key escrow, and coordination of characteristics issued from particular forces. In this paper, we propose a protected data recovery arrangement using for decentralized disruptiontolerant network where various key forces manage their properties freely. We display how to apply the proposed part to securely and proficiently deal with the portrayed data scattered in the data scattered in the Interference or disruption tolerant network.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Computational Complexity Reduction of OFDM Signals by PTS with Various PAPR Conventional Methods
Authors : BANOTHU RAMESH, MR. B. GIRI RAJU, , ,
Affiliations : M.Tech, DECS, ACE ENGINEERING COLLEGE
Professor, Dept. of ECE, ACE ENGINEERING COLLEGE
Abstract :
- In this paper we analyze Partial transmit sequences (PTS),it is one of the most attractive schemes to reduce the Peak-to-Average Power Ratio (PAPR) reduction in Multi-Input Multi-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system with Space Frequency Block Coding (SFBC) is proposed. However, the Optimal PTS (OPTS) scheme requires an exhaustive searching over all combinations of allowed phase factors. Consequently, the computational complexity increases exponentially with the number of the subblocks. Recursive phase weighting (RPW) technique is a novel method whose aim is to reduce computational complexity and achieve the same performance in PAPR reduction as compared to O-PTS.Theoretical analysis and simulation results show that , compared with O-PTS and PTS employing RPW, PTS with AO-RPW method reduces the computational complexity but at the cost of loss of performance for PAPR reduction.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : The Effective Design of Information Sharing System for Human Networks
Authors : KASINDALA DANARAO, G.MINNI, , ,
Affiliations : M.Tech (IT), Department of Computer Science & Engineering
Associate Professor, Department of Computer Science & Engineering, Nimra College of Engineering and Technology, Andhra Pradesh, India
Abstract :
In recent times, most mobile applications are for information sharing; mobile devices are increasingly becoming the end points of information consuming and gradually fetching end points of information consuming. Motivated by the new demands of application as well as limitations of existing architecture, we imagine a novel type of energetic networking service known as human networks. A human network design was introduced which a network design that facilitates information is sharing among mobile devices all the way through direct interdevice communication. The system comprises of portable devices that contains wireless communication interfaces. In our work we introduced BSUB, which is an interest motivated system of information sharing for human networks, a content-based publish or else subscribe that attain infrastructure-less communication among mobile devices. The system employs peer to peer communication prototype in human networks, and allows the entire users exchange their interests throughout random contacts. It is proposed for minute to medium sized networks and composed of several devices controlled in a restricted physical area where inter-device communication occasions are plentiful and includes content representation and pub/sub routing; and employs tag-based content description representation.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Study on PASS: A Parallel Activity-Search System
Authors : MADIPADIGA VENKATESH, V .RAMESH, , ,
Affiliations : M.Tech (CS), Department of Computer Science & Engineering
Assistant Professor, Department of Computer Science & Engineering, Sri Indu Institute of Engineering and Technology, R.R Dist Telengana, India
Abstract :
In this paper we investigate on set of activities presented via temporal stochastic automata, partitions of activities based on level based events, in this connection our investigation on issues with activity creations on temporal multi-activity graph in order to address this issues as our proposed system how system used PASS architecture with various implementation parts with that coordinates computations across nodes in the cluster and also shown that this algorithms enables to handle both large numbers of observations per second as well as large merged graphs. And also shown Partitioning times vs. TMAG size for different partitioning schemes and TMAG densities (sparseS, dense-D), averaged over number of compute nodes.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Inferring User Search Goals with Feedback Sessions using K-means clustering algorithm
Authors : Dasari Amarendra, Kaveti Kiran Kumar, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Assistant Professor, Department of Computer Science & Engineering, NRI Institute of Technology.
Abstract :
Recognizing or inferring client's search objective from given query is a difficult job as search engines let users to identify queries simply as a list of keywords which might refer to broad topics, to technical terminology, or even to proper nouns that can be used to guide the search procedure to the significant compilation of documents. In order needs of users are correspond to by queries submitted to search engines and different users have different search goals for a broad topic. Sometimes queries may not exactly represent the user's information needs due to the use of short queries with uncertain terms. thus to get the best results it is necessary to capture different user search goals. These user goals are nothing but information on different aspects of a query that different users want to obtain. The judgment and analysis of user search goals can be improved by the relevant result obtained from search engine and user's feedback. Here, feedback sessions are used to discover different user search goals based on series of both clicked and unclicked URL's. The pseudo-documents are generated to better represent feedback sessions which can reflect the information need of user. With this the original search results are restructured and to evaluate the performance of restructured search results, classified average precision (CAP) is used. This evaluation is used as feedback to select the optimal user search goals.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Survey on Dynamic Secure group Data Sharing framework among Public Cloud
Authors : Pathan Jilani, Sayeed Yasin, , ,
Affiliations : (M.Tech) IT, Nimra College of Engineering & Technology
Associate Professor & HOD, Dept of CSE, Nimra College of Engineering & Technology.
Abstract :
In cloud computing outsourcing, cluster plus among cloud shoppers could be a noteworthy check, therefore cloud computing provides a token effort and everyone around sorted out the arrangement. Thanks to incessant modification of participation, sharing data Associate in Nursing exceedingly in a very multi-owner manner to an untrusted cloud continues to be its testing issue. During this paper, we have a tendency to project a protected multi-owner data sharing arrange for a dynamic cluster in folks, in general, cloud. By furnishing AES cryptography with convergent key whereas transferring the knowledge, any cloud shopper will safely impart data to others. Within the in the meantime, the capability overhead and cryptography calculation expense of the arrange area unit free with the amount of unacknowledged shoppers. Also, I break down the protection of this arrange with thorough confirmations. One-Time Secret word is one in every of the only and most well-known sorts of confirmation which will be utilized for securing access to accounts. One-Time Passwords area unit of times alluded to as secure and additional grounded sorts of confirmation in an exceedingly multi-owner manner. Broad security and execution examination demonstrates that our projected arrange is deeply productive and fulfills the protection requirements for open cloud-based secure cluster sharing.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy and Protecting Locality based Rewarding method via Redemption System
Authors : K.SRIKANTH, Ms.M.SUJANA, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, Malla Reddy College Of Engineering
Assistant Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
Abstract :
Theoretical Location is rapidly transforming into the application as area empowered mobile handheld duplicate devices. One class of applications that has yet-to-create is those in which users have a force to lie about their location. These applications can't depend independently on the user’s gadgets to discover and transmit location data in light of the way that users have a helper to swindle. Maybe, such applications require their users to show their locations. Today's mobiles clients neglect to offer a framework to show their current then again past location. In hate of the way that locations based applications have existed for a couple quite a while, affirming the rightness of a customer's declared locations is a test that has pretty much starting late got thought in the investigation bunch. Continued with advances in mobiles frameworks and arranging developments have made a strong business push for locations based applications. Cases fuse area mindful emergency response, locations based notification, and locations in light of entertained. A key test in the wide association of LocationBased Services (LBS) is the security careful organization of locations data. The late work in imparted media content what's more, sensed information made by versatile end-clients is trying settled gauges likewise assumptions in information trust models. A focal issue addresses in this paper is the way by which to fabricate some trust level in the realness of substance made by untrusted locations users. In this it handle the issue of discovering noxious users by putting away IMEI number while user registration. In this way framework saving security in compensating framework that implies redemption system. This number is encoded and put away in central controller. Token distributor and token collector are utilized for remunerating.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data
Authors : G.Dileep Kumar, A.Sreenivasa Rao, , ,
Affiliations : M.Tech (CS), Department of Computer Science & Engineering, Malla Reddy College Of Engineering
Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
Abstract :
In this paper, we distinguish the framework prerequisites and difficulties toward accomplishing privacy preserving outsourced cloud data services, usable configuration and basically effective quest plans for scrambled cloud storage. We are exhibiting a general approach for these utilizing searchable encryption methods, which permits scrambled data to be sought by clients without leaking data about the data itself and client's solicitation. Empowering open review capacity for cloud storage is of discriminating significance with the goal that clients can utilize something like a third party auditor (TPA) to check the trustworthiness of outsourced data and can be effortless. To proficiently present a compelling TPA, the examining procedure ought to get no new vulnerabilities towards client data protection, and help to evade extra online weight to client. We propose a protected and productive cloud storage framework supporting privacy preserving open sourced cloud storage data.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Survey on Progressive Packet Arrivals in DTNs Using Dynamic Allocation
Authors : G.KUMARASWAMY, E.CHITTIBABU, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, Malla Reddy College Of Engineering
Assistant Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
Abstract :
Delay Tolerant Networks (DTNs), also called as intermittently connected mobile networks, are wireless networks in which a fully connected path from source to destination is unlikely to exist. However, effective forwarding based on a limited knowledge of contact behavior of nodes is challenging. When large files need to be transferred from source to destination make all the packets available at the source and transfer the file as small packets. We study the packets arrival at source and analysis their performance. We consider the linear blocks and rateless linear coding to generate redundancy and also for energy constraint .We scheduling the large file into small packets and delivering through multipath to destination, for this we use optimal user centric allocation and scheduling the packets in the receiver side.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Study on Dynamic Resource Allocation using Virtual Machines for IAAS
Authors : Jella.Kishore, B.Kishore, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, Malla Reddy College Of Engineering
Assistant Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Maisammaguda (v) I Dhulapally (M), Secunderabad.
Abstract :
Cloud computing allow business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of “skewness” to measure the unevenness’ in the multi-dimensional resource utilization of a server. By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used. Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Social Mining to Progress the Procedure Potency Exploitation MapReduce
Authors : M.Jayasri, S Venkata Narayana, , ,
Affiliations : M.Tech (CSE), Department of Computer Science & Engineering, NRI Institute of Technology
Professor, Department of Computer Science & Engineering, NRI Institute of Technology
Abstract :
Graphs are widely employed in massive scale social network analysis. Graph mining more and more necessary in modeling difficult structures like circuits, images, web, biological networks and social networks. The key issues occur during this graph mining are machine potency (CE) and frequent sub graph mining (FSM). Machine potency describes the extent to that the time, effort or potency that use computing technology in IP. Frequent Sub graph Mining is that the mechanism of candidate generation while not duplicates. FSM faces the matter on numeration the instances of the patterns within the dataset and numeration of instances for graphs. The most objective of this project is to handle atomic number 58 and FSM issues. The paper refer to within the reference proposes associate degree formula referred to as Mirage formula to unravel queries exploitation sub graph mining. The planned work focuses on enhancing associate degree unvarying MapReduce based mostly Frequent Sub graph mining formula (MIRAGE) to contemplate optimum machine potency. The check information to be thought-about for this mining formula may be from any domains like medical, text and social data’s (twitter).The major contributions are: associate degree unvarying Map Reduce based mostly frequent sub graph mining formula referred to as MIRAGE won’t to address the frequent sub graph mining drawback. Machine potency is going to be enlarged through MIRAGE formula over Matrix Vector Multiplication. Performance of the MIRAGE are going to be incontestable through totally different artificial likewise as world datasets. The most aim is to improvise the prevailing formula to boost machine potency.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Preserving Data Repossession for Decentralized Disruption-Tolerant Military Networks
Authors : Seelam Sowjanya, Dr Akbar Khan, , ,
Affiliations : (M.Tech) –CSE, Nimra Institute of Science & Technology
Professor, Dept of CSE, Nimra Institute of Science & Technology,
Abstract :
Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most encouraging cryptographic solutions are acquainted with control the access issues called Cipher text-Policy Attribute-Based Encryption (CP-ABE). The absolute most difficult issues in this situation are the requirement of approval solutions and the approaches upgrade for secure data recovery. On the other hand, the issue of applying CP-ABE in decentralized DTNs presents a few securities and protection challenges as to the attribute revocation, key escrow, and coordination of attributes issued from distinctive powers. In this paper, we propose a safe data recovery plan utilizing CP-ABE for decentralized DTNs where numerous key powers deal with their attributes independently. We exhibit how to apply the proposed component to securely and capably manage the characterized data scattered in the data dispersed in the Interruption or disruption tolerant network.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Efficient BER Analysis of OFDM System over Nakagami-m Fading Channel
Authors : INDUGABILLI HEMANTH KUMAR, P.N.VENKATESWARA RAO, , ,
Affiliations : (M.Tech) DECS from VITAM College of Engineering
Assistant Professor, ECE Dept. in VITAM College of Engineering, Andhra Pradesh, India.
Abstract :
In this paper we present an efficient technique for the BER of OFDM system over Nakagami–m fading channels, using well known characteristics function based analysis approach. The average BER expressed in terms of the higher transcendental function such as the confluent hyper geometric functions. Our numerical results show that depending on the number of channel taps, the BER performance may degrade with increasing values of Nakagami–m fading parameters. Phase noise causes significant degradiation of performance of the system. The effects of the pahse noise on the performancr of the OFDM sysytems have been analytically evaluated. In this project the BER and MSE performance of the OFDM system over multipath fadding channel was analysed.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Estimate Transient Carrier Frequency offset by using Low Complexity Parametric Estimation Algorithm
Authors : SUDHAKAR BABU KASI, D APPANNA TATAJEE, , ,
Affiliations : (M.Tech) DECS from Vitam College of Engineering
Associate Professor, ECE Dept. in VITAM College of Engineering, Andhra Pradesh, India.
Abstract :
- In this paper we are presenting the carrier frequency offset ,the primitive objective of this Paper is to estimate transient carrier frequency offset by using low complexity parametric estimation algorithm. We explore the modeling and estimation of the transient CFO, which is modeled as the response of an under damped second order system. To compensate for the transient CFO, we propose a low complexity parametric estimation algorithm, so in the proposed method we are estimated the CFO by using frequency domain in this method the signal is travelled in parallel so more signals can be send through this method.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Energy Efficient Multiple Access Scheme for Multi-User System with Improved Gain
Authors : DUKKA VENKATARAMANA, CHIRANJEEVULU BAGATHI, , ,
Affiliations : (M.Tech) DECS from Vitam College of Engineering</br>Assistant Professor, ECE Dept. in VITAM College of Engineering, Andhra Pradesh, India.
Abstract :
In this paper we demonstrates development of the energy efficiency (EE) of multi-user multiple-input multiple-output (MIMO) orthogonal frequency-division multiple access (OFDMA) system, an Energy-efficient multiple access (EMA) scheme is proposed. It improves EE by selecting either time-division multiple access (TDMA) or spacedivision multiple access (SDMA) based on the no. of users or power consumption. Here, we introduced normalization process for power in OFDM system to improve the power gain. Numerical results verify that the EE and power gain can be significantly improved through the proposed EMA scheme.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : A Computational Dynamic Trust Model for User Authorization
Authors : K.S. Harika Hampi, Prof. C.Uma Shankar , Dr. S.Prem Kumar , ,
Affiliations : Pursuing M.Tech, CSE Branch,Dept of CSE
Registar Rastriya Sanskrit Vidyapeetha Tirupathi.Andhra Pradesh,India.
Professor & HOD, Department of computer science and engineering
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Improvement of authorization process for protected information access by a large society of users in an open environment is an important problem in today’s Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in capability in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Many Model studies were conducted to evaluate the presentation of the proposed integrity belief model with other trust models from the creative writing for different user behavior patterns. Results showed that the proposed model resulted in higher performance than other models especially in predicting the behavior of unbalanced users.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Audit Free Cloud Storage via Deniable attribute based Encryption
Authors : C.Anusha, M.Srilakshmi, Dr. S.Prem Kumar , ,
Affiliations : Pursuing M.Tech, CSE Branch, Dept of CSE
Assistant Professor, Department of Computer Science and Engineering
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract :
Cloud storage services have grow popularly. For the importance reason of privacy, many cloud storage encryption schemas has been proposed to secure the data from those who do not have access. All such schemes assumes that cloud storage providers are secure and cannot be hacked. However in practice, some authorities may compel cloud storage providers to make public user secrets and confidential data. We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. In this paper a new cloud storage encryption schema is proposed which allows cloud storage providers to protect user privacy. Since authorities cannot tell the obtained secrets are true or false, the cloud storage providers ensure that the user privacy is still securely provided. The proposed schemes believe cloud storage service providers or trusted third parties handling key management are trusted and cannot be hacked. Some times may intercept the communication between users and cloud storage providers and then compel storage providers to release user secrets by using government power or other means. In this case the encrypted data are assumed to be known and storage providers are requested to release user secrets. The proposed Deniable CP-ABE scheme is to build an Audit free cloud storage service. The deniability feature makes coercion invalid, and the ABE property ensures secure cloud data sharing with a fine grained access controlled mechanism.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Reverse Super Edge-Magic Labeling on W-trees
Authors : S. Sharief Basha, , , ,
Affiliations : Applied Algebra Division, School of Advanced Sciences, VIT University, Vellore 632 014, Tamilnadu, India.
Abstract :
A reverse edge-magic labeling of a graph G is a one-to-one map f from V(G) E(G) on to the integers {1,2,3,…., } with the property that , there is an integer constant c such that f(xy)-{f(x)+f(y)}=c for any (x,y) ∈ E(G) . If f (V(G)) = {1,2,3,… } then the reverse edge – magic labeling is called reverse super edge-magic labeling . In this paper we formulate reverse super edge-magic labeling on w-trees.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : OBD-II: Power train and Emission Control in Passenger Vehicles
Authors : DR. PORAG KALITA, Ph.D. (Auto. Engg.) , , , ,
Affiliations : HEAD - Automobile Engineering Department, Vocational Education (+2), M R S Higher Secondary School, Govt. of Assam. Titabor, Jorhat, ASSAM, INDIA.
Abstract :
OBD-II provides additional information to engineer for diagnosis and repair of emissions related problems. OBD-II, standardizes on the amount of memory (Freeze Frame) it uses to store the readings of the vehicle sensor when it logs on emission related Intermittent Trouble code (IT). The intent of OBD-II, systems is to detect most vehicle malfunctions when performance of a power train component or system deteriorates to the point that the vehicle’s HC emission exceed standard. The vehicle operator is notified at the time when the vehicle begins to marginally exceed emission standards, by illuminating the Malfunctions Indicator Light (MIL).
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Experimental Study on Automobile Clutch Plate Juddering
Authors : DR. PORAG KALITA, Ph.D. (Auto. Engg.) , , , ,
Affiliations : HEAD - Automobile Engineering Department, Vocational Education (+2), M R S Higher Secondary School, Govt. of Assam. Titabor, Jorhat, ASSAM, INDIA.
Abstract :
The coupling of two working parts, for example two shaft, in such a way as to permit connection or disconnection at will without the necessity of bringing both parts to rest, and when connected to transmit the required amount of power without sign is known as Clutch and or, the friction or hydraulic actuated mechanism used for coupling two shafts or similar parts, one or which drives and the other of when is driven by the Clutch. Clutch plate assembly has three principal components i.e. Flywheel, Clutch plate and Pressure Plate. The device used is the Clutch which transmits the rotary motion of the engine to the transmission, which required by the driver and located between the engine and the gear box and which it connects and disconnects the two units smoothly without shock. As per the theory of the Clutch, first assumption is used in case of problems involving power absorption by friction. Second assumption is used in case of problems involving power transmission by friction between the surfaces.
:NOT ASSIGNED
DOI Link : NOT ASSIGNED


Paper Title : Design and Simulation of High Speed Low Power CMOS Comparator
Authors : A.Rajeswari, T.Venkatarao, , ,
Affiliations : (M.Tech) DECS Branch, Department of ECE
Asst.Professor, Department of ECE Vignan's Nirula Iinstitute of Technology & Science for Women Pedapalakaluru, Guntur, Andhra Pradesh, India
Abstract :
In high-speed high-resolution analog to digital converters, comparators have a key role in quality of performance. High power consumption and delay is one of the drawbacks of these circuits which can be reduced by using suitable architectures. Many versions of comparator are proposed to achieve desirable output in sub-micron and deep submicron design technologies. Back to-back inverter in the latch stage is replaced with dual-input single output differential amplifier. This topology completely removes the noise that is present in the input. The structure shows lower power dissipation and higher speed than the conventional comparators. The circuit is simulated with 0.8V DC supply voltage and 250 MHz clock frequency. The proposed circuit analyses the Inverter based differential amplifier design compared to double tail comparator is a less delay and controls the power dissipation. Finally output results shown by using T-Spice tool in TSMC018
:NOT ASSIGNED
DOI Link : NOT ASSIGNED

 


Paper Title : Optimized control of Induction Heating System
Authors : Mrs. Asawari Dudwadkar , Dr. (Mrs.) Sayle Gha, , ,
Affiliations : JJT University, Rajasthan, Asst. Prof., VESIT,Mumbai, India
Abstract :
In this paper a simple power and frequency control scheme is proposed for high power/high frequency Induction heating for Typical Heavy Industrial Applications like Induction Welding & Annealing which require operating on 100 kW / 100 kHz. The Proposed PI controller controls the load parameter values of R and L and thereby controls the resonance frequency of the whole model. The control scheme has the advantages of not only wide power regulation range but also ease of control output power. Also, it can achieve the stable and efficient Zero-Voltage-Switching in whole load range. The proposed method is described in detail and its validity is verified through simulink model. The model achieves proper power control for load ranging from 80 kW to 100kw.
:-NA-
DOI Link : NA


Paper Title : Bike Rider’s Safety Measures Using Helmet as a Key
Authors : Sanjeev Sahu, Lokesh Yadav, K Diwakar, Vibhor William, ,
Affiliations : Mechatronics Engineering Department Chhatrapati Shivaji Institute of Technology Durg-491001, Chhattisgarh, India
Abstract :
Background/Objectives: The basic idea of the project is to make the helmet so smart that without wearing it the driver won’t be able to start the bike, so that it can ensure the safety of the riders. The main purpose of the project is to encourage wearing helmet. Method: The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having micro switches fitted inside it, which will act as our switch for on/off ignition. It consist of a RF transmitter and an RF receiver system, the bike will not get started without wearing helmet by the driver, as the rider wear helmet an RF signals radiate from the transmitter and once these RF signals get sensed by the receiver placed in the ignition switch on the bike, bike will get started. Findings: People prefer motorcycles over the car as it is much cheaper to run, easier to repair, easier to park and flexible in traffic. In India more than 37 million people are using two wheelers. Since usage is high accident percentage of two wheelers are also high compared to four wheelers. Motorcycles have a higher rate of fatal accidents than trucks and buses. According to Ministry of Road Transport and Highways, Government of India there are around 1,44,391 bike accidents occurred in 2015 due to which 1,35,343 were injured and 36,803 were killed. Fatal injuries to the brain are an important reason behind deaths due to the road accidents. Therefore, a person riding a two wheeler must wear a helmet in order to protect his skull. Studies show that usage of helmet can save accident death by 30 to 40 percent. The risk of death is 2.5 times more among riders not wearing a helmet compared with those wearing a helmet. Riders wearing a helmet have a greater probability of survival during an accident. This project aims for accident avoidance, safety and security of bike riders. Applications: This can be used to minimize the accidents and casualties during riding can be used in broadcasting a message among the youth about the road safety and also a number of cases of violating traffic rules can be reduced.
:-NA-
DOI Link : NA


Paper Title : Link quality based Ant based Routing Algorithm (LARA) in MANETs
Authors : C.V.Anchugam, Dr.K.Thangadurai, , ,
Affiliations : Link quality based Ant based Routing Algorithm (LARA) in MANETs
Abstract :
Recently a new method is developed to handle the problem of routing in ad hoc network and overcomes the shortcomings of the classical methods; these methods are based on swarm intelligence inspired from biological swarms, such as ants in order to solve some complex problems such as finding food or optimizing route to food in real insect swarms. One of the most known routing algorithms for MANETs, as described Ant based Routing Algorithm (ARA) suffers from some limitations within the pheromone computing since it has not taken the necessary consideration to the characteristics of MANETs such as mobility and the medium constraint. Therefore, in our proposed enhancement to ARA called Link quality based ARA (LARA), it can be included the link quality in route selection and probability computing which have considerably improved the network performance and the system lifetime.
:-NA-
DOI Link : NA


Paper Title : A Comparative Study of Discovering Frequent Subgraphs – Approaches and Techniques
Authors : B.Senthilkumaran, Dr.K.Thangadurai, , ,
Affiliations : P.G. and Research,Department of Computer Science, Government Arts College (Autonomous), Karur-05.
Abstract :
Graph mining is an important research vertical and recently the usage of graphs has become increasingly imperative in modeling problematic complex structures such as electrical circuits, chemical compounds, protein structures, bioinformatics, social networks, workflow diagrams, and XML documents. Plethora of graph mining algorithms has been developed and the primary objective of this paper is to present a detailed survey regarding the approaches and techniques employed to find the issues and complexities involved.
:-NA-
DOI Link : NA


Paper Title : Detection and area calculation of brain tumour from MRI images using MATLAB
Authors : Suman Das, Nashra Nazim Siddiqui, Nehal Kriti and Surya Prakash Tamang, ,
Affiliations : Sikkim Manipal Institute of Technology, Sikkim-737132, India
Abstract :
The main objective of our task is to recognize a tumour and its quantifications from a particular MRI scan of a brain image using digital image processing techniques. The motivation of our work is to provide an efficient algorithm for detecting the brain tumour and calculating its growth. This research describes the proposed strategy to detect & extraction of brain tumour from patient’s MRI scan images of the brain. This method incorporates with some noise removal functions, segmentation and morphological operations which are the basic concepts of image processing. Detection and extraction of tumour from MRI scan images of the brain is done by using MATLAB software.
:-NA-
DOI Link : NA

Paper Title : Design of a System to Import Common Information of an Applicant from a Centralized Database While Filling Online Recruitment Application Form
Authors : Govind Prasad Arya, Devendra Prasad, , ,
Affiliations : Uttarakhand Technical University, Dehradun, Assistant Professor in Computer Science & Engineering Department, Shivalik College of Engineering, Dehradun, India
Abstract :
In the past recruitment application forms were filled on papers by the candidates and then the filled forms were sent to the recruitment organization through postal services. But in current scenario most of the recruitment organizations are providing the facility of filling application forms online to the candidates. The candidate fills various application forms on regular basis due to higher degree of unemployment. It takes quite long to fill an application form as so many information like name, father’s name, mother’s name, date of birth, gender, addresses, qualification details, work experience has to be filled by candidate every time while filling the application forms of each recruitment organization. Sometimes the candidate has to fill the same information multiple times due to improper internet connectivity. It is also difficult to fill an application form using mobile because of the complex application interface. The applicants who have good computer knowledge may be comfortable with the filling of such complex forms online but it is very tedious